There has been an increased number of smartphone users in recent years all over the world. In a research released by datareportal, the world population stands at 7.1billion people, and there are about 2.71billion smartphone users, accounting for almost ev

computer science

Description

1.    Introduction

 

There has been an increased number of smartphone users in recent years all over the world. In a research released by datareportal, the world population stands at 7.1billion people, and there are about 2.71billion smartphone users, accounting for almost every third person worldwide owns a smartphone (datareportal, 2019).

Smartphones and tablets have become essential for accessing social media applications, emails, cloud computing, banking applications and several other utility applications (Fudong et al., 2014). Users also store essential information such as pictures, contact numbers, schedules and several other personal information in smartphones (Feng, 2015).

Along with the increased number of smartphone users, security and privacy threats come into play, smartphone applications such as banking applications require a high level of confidentiality. As such, it is essential to secure data stored on mobile phones (Fudonget al., 2014).

1.1 Problem statement

 

According to The Telegraph, in 2018, an average smartphone user uses their phone at least once in every twelve (12) minutes (Hymas, 2018). As smartphones are meant for recurrent and quick use, it is now essential to maintain the privacy of sensitive information and data in these devices by using non-intrusive but fast and more accurate authentication methods (Muhammad et al.,2017).

Unfortunately, most widely used authentication methods such as PINs, passwords, pattern locks, fingerprint scans require a user to interact with the phone actively and put in some information or draw sophisticated patterns on touch screens before a user is authenticated, this is frustrating for smartphone users authentication (Muhammad et.al., 2017). Using human behavioural patterns to continuously and implicitly authenticate mobile phone users using inbuilt mobile phone sensors addresses most of the issues of authenticating a smartphone with little or no effort (Muhammad et al., 2017). The accuracy of biometric authentication increases with the use of more than one biometrics. Analysing and evaluating mobile phone sensors would enable thorough research on biometric and contextual data which is suitable for combination for a multi-biometric transparent and continuous user authentication.


Related Questions in computer science category