Identity theft is one of the biggest challenges to protecting electronic devices, especially in protecting Smartphones. Authentication and its techniques are the most vulnerable to problems, such as traditional, pattern password and PIN code etc. In addition, biometric techniques are safer than normal authentication methods. Therefore, these techniques are related to the characteristics of human beings and used to authenticate who owns them. Besides, authentication is granted by a remote server to protect authentication data onto theft and manipulation. However, remote servers are vulnerable to problems such as hacker attacks, and systems and communications problems. On the other hand, the connection to the server should be available when requesting authentication from a Smartphone, otherwise the user will not be able to access his device. In this paper, we discuss the failure connected to remote server in order to obtain authentication, and some cases lead to non-authentication. We are discussing the user's access to the Smartphone by any biometric devices currently in use. When using of the local server if the remote server fails, by creating a Virtual Server (VS) on the Smartphone. For example: a user cans only access to his device, when obtain on the authorize form VS. It has the same specifications and environment, as the original server.
Aviv, A. J., Sapp, B., Blaze, M., & Smith, J. M. (2012). Practicality of accelerometer side channels on smartphones. Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12. doi:10.1145/2420950.2420957.
Derawi, M. O., Nickel, C., Bours, P., & Busch, C. (2010). Unobtrusive user-authentication on mobile phones using biometric gait recognition. In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on (pp. 306-311). IEEE.
Doroz, R., & Porwik, P. (2011). Handwritten Signature Recognition with Adaptive Selection of Behavioral Features. Communications in Computer and Information Science, 128-136. doi:10.1007/978-3-642-27245-5_17.
Feng, T., Zhao, X., & Shi, W. (2013). Investigating mobile device picking-up motion as a novel biometric modality. In Biometrics: Theory, Applications and Systems (BTAS), 2013 IEEE Sixth International Conference on (pp. 1-6). IEEE.
Guerra-Casanova, J., Avila, C. S., Bailador, G., & De-Santos-Sierra, A. (2011). Time series distances measures to analyze in-air signatures to authenticate users on mobile phones. In Security Technology (ICCST), 2011 IEEE International Carnahan Conference on (pp. 1-7). IEEE.
Laghari, A., & Memon, Z. A. (2016). Biometric authentication technique using smartphone sensor. In Applied Sciences and Technology (IBCAST), 2016 13th International Bhurban Conference on (pp. 381-384). IEEE.
Shuwandy, M. L. (2013). Smile Mask to Capsulation MOLAZ Method. International Journal of Computer Science and Network Security (IJCSNS), 13(12), 66.
Vildjiounaite, E., Makela, S. M., Lindholm, M., Riihimaki, R., Kyllonen, V., Mantyjarvi, J., & Ailisto, H. (2006). Unobtrusive multimodal biometrics for ensuring privacy and information security with personal devices. In International Conference on Pervasive Computing (pp. 187-201). Springer, Berlin, Heidelberg.
Weiss, G. M., & Lockhart, J. W. (2011). Identifying user traits by mining smart phone accelerometer data. In Proceedings of the Fifth International Workshop on Knowledge Discovery from Sensor Data (pp. 61-69). ACM.
Yeh, K., Lo, N. W., & Li, Y. (2010). Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture. International Journal of Communication Systems, 24(7), 829-836. doi:10.1002/dac.1184
In-Text Citation: (Shuwandy, Salih, Abdulwahhab, & Ahmed, 2019)
To Cite this Article: Shuwandy, M. L., Salih, M. M., Abdulwahhab, Z. T., & Ahmed, M. A. (2019). Discussion: Smartphone Authentication from Offline Remote Server. International Journal of Academic Research in Business and Social Sciences, 9(14), 17–24.
Copyright: © 2019 The Author(s)
Published by Human Resource Management Academic Research Society (www.hrmars.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode