Publication details

Home Publications Publication details

The Current Use of Authentication Technologies: An Investigative Review
Al Abdulwahid A, Clarke NL, Stengel I, Furnell SM, Reich C
Proceedings of the IEEE 2015 International Conference on Cloud Computing (ICCC15), pp 239-246, ISBN 15: 978-1-4673-6618-2, 2015
Links:  External link available

Individuals, businesses and governments undertake an ever-growing range of activities online and via various Internet-enabled digital devices. Unfortunately, these activities, services, information and devices are the targets of cybercrimes. Verifying the user legitimacy to use/access a digital device or service has become of the utmost importance. Authentication is the frontline countermeasure of ensuring only the authorized user is granted access; however, it has historically suffered from a range of issues related to the security and usability of the approaches. Further to this, they are still mostly functioning at the point of entry and those performing sort of re-authentication executing it in an intrusive manner. This paper reviews the authentication methods along with the current use of authentication technologies, aiming at developing a current state-of-the-art understanding addressing the open problems to be tackled and available solutions to be adopted. Furthermore, it investigates whether these authentication technologies have the capability to fill the gap between high security and user satisfaction. Ultimately, it concludes that providing users with adequate protection and convenience requires innovative robust authentication mechanisms to be utilized in a universal level, thus operating in a transparent, continuous and user-friendly manner.

Al Abdulwahid A, Clarke NL, Stengel I, Furnell SM, Reich C