Modern Authentication Methods: A Comprehensive Survey
Open Access
- 1 June 2022
- journal article
- Published by IntechOpen in AI, Computer Science and Robotics Technology
- Vol. 2022, 1-24
- https://doi.org/10.5772/acrt.08
Abstract
This paper presents a comprehensive investigation of modern authentication schemes. We start with the importance of authentication methods and the different authentication processes. Then we present the authentication criteria used and we perform a comparison of authentication methods in terms of universality, uniqueness, collectability, performance, acceptability, and spoofing. Finally, we present multi-factor authentication challenges and security issues and present future directions.Keywords
This publication has 26 references indexed in Scilit:
- Smartwatch: Performance evaluation for long-term heart rate monitoringPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Is secure and usable smartphone authentication asking too much?Computer, 2015
- Multi-modal authentication system for smartphones using face, iris and periocularPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Secure biometric template generation for multi-factor authenticationPattern Recognition, 2015
- Authentication protocol for an ambient assisted living systemIEEE Communications Magazine, 2015
- Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacksDecision Support Systems, 2014
- Smart keys for cyber-carsPublished by Association for Computing Machinery (ACM) ,2013
- Thermal Imaging as a Biometrics Approach to Facial Signature AuthenticationIEEE Journal of Biomedical and Health Informatics, 2012
- Biometric Authentication and Identification Using Keystroke Dynamics: A SurveyJournal of Pattern Recognition Research, 2012
- End-Users’ Acceptance of Biometrics Authentication to Secure E-Commerce within the Context of Saudi CulturePublished by IGI Global ,2012