Publication details

Home Publications Publication details

A Composite User Authentication Architecture for Mobile Devices
Clarke NL, Furnell SM
Journal of Information Warfare, vol. 5, no. 2, pp11-29, 2006

As the functionality and services provided by mobile devices increases, the need to provide effective user authentication against misuse and abuse becomes ever more imperative. With traditional secret knowledge based techniques having been proven weak, a requirement exists for authentication techniques to provide stronger protection. This paper proposes the use of a portfolio of authentication techniques to provide a robust, accurate and transparent authentication mechanism for mobile devices, extending security beyond point-of-entry into a continuous and user convenient approach. An Intelligent Authentication Management System (IAMS) is described that provides a continuous confidence level in the identity of the user, removing access to sensitivity services and information with low confidence levels and providing automatic access with higher confidence levels. The theoretical level of system performance is examined on a range of mobile devices, suggesting that it should be possible to achieve acceptably low levels of false acceptance and false rejection error in practical application.

Clarke NL, Furnell SM