Sensor-based authentication in smartphone: A systematic review

With the widespread usage of smartphones, users not just using their smartphone for calls and messaging only, but they are using it for a variety of purposes such as banking transactions, e-mailing, chatting, online shopping, video conferencing, health monitoring, and many more. Most of these activi...

Full description

Saved in:
Bibliographic Details
Published in:Maǧallaẗ al-abḥath al-handasiyyaẗ
Main Authors: Shuwandy, Moceheb Lazam, Jouda, A.S., Ahmed, M.A., Salih, Mahmood M., Al-qaysi, Z.T., Alamoodi, A.H., Garfan, Salem, Albahri, O.S., Zaidan, B.B., Albahri, A.S.
Format: Journal Article
Language:English
Published: Elsevier B.V 01-02-2024
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With the widespread usage of smartphones, users not just using their smartphone for calls and messaging only, but they are using it for a variety of purposes such as banking transactions, e-mailing, chatting, online shopping, video conferencing, health monitoring, and many more. Most of these activities store personal and sensitive data of the user on the device, reaching this confidential information by unauthorized person may cause huge losses and bad consequences. Therefore, securing the smartphone’s accessibility from unauthorized people became an extremely essential. With the advanced development in the area of sensor-based smartphone authentication methods, different methods were developed to be easily used by users through specific criteria. However, many aspects haven’t been discovered yet in the area of sensor-based smartphone authentication methods. On the basis of that, this study aims to review the area of sensor-based smartphone authentication methods systematically to provide a comprehensive understanding of this new area and to discuss the current challenges and issues. To conduct this systematic review, four scientific digital databases were utilized; ScienceDirect, IEEE Xplore, Web of Science, and Scopus. The total number of studies found was n = 256 articles, only n = 46 articles were included based on our inclusion criteria. To provide a comprehensive understanding of the included studies, taxonomy was drawn. Also, this study provides a discussion on the current motivations, challenges and issues, and recommendations in sensor-based smartphone authentication methods. This review enlightens, encourage, and direct researchers to develop authentication solutions and reduce the current gaps in this area.
ISSN:2307-1877
2307-1885
DOI:10.1016/j.jer.2024.02.003