An Enhanced Bilateral Authentication System for Android Devices

Authors

  • M. A. Ogunrinde Fountain University, Osogbo, Nigeria
  • W. A. Adebare Fountain University, Osogbo, Nigeria
  • R. A. Azeez Fountain University, Osogbo, Nigeria
  • B. A. Abdulsalami Fountain University, Osogbo, Nigeria
  • I. A. Osuolale Fountain University Osogbo, Nigeria

DOI:

https://doi.org/10.53704/fujnas.v8i2.283

Abstract

Authentication is a method that verifies that users or systems are who they claim to be, based on identity of any form. Smart devices are often lost or stolen; password could be easily detected or hacked. Most of the new model smart devices have inbuilt security for authentication which most times do not work perfectly. For that purpose, high level of authentication for smart devices is needed. The need to ensure security of information on these devices is highly necessary and at the same time difficult. This work developed an enhanced authentication system for android based mobile devices to increase the security level and confidentiality of its information which enables user-friendliness environment. It combines face recognition methods with pin or pattern which makes it more robust and reliable in securing our mobile devices. The implementation was done using Schulz Android Studio SDK and developed with the following programming languages: JavaScript, XML (Extensible Markup Language), OpenCV, and Java. The developed application can be installed and work on any mobile device with the latest android operating system and its backward compatible. The system was tested on different smart devices from different vendors and its efficiency is above 90%. Evaluating the application with some existing systems was done in order to ascertain the reliability of the solution and strengthen it. The system tagged MULTILOCK enables users to register more than one user, and gain access to the device with either pin or pattern together with a registered faces.

Keywords: Face detection, Security, Mobile devices, Confidentiality, Pin, Pattern

References

Agrawal, A. & Patidar, A. (2014). Smart Authentication for smart phones. International Journal of Computer Science and Information Technologies 5 (4), 4839-4843.

Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S. & Sakurai, K. (2016). Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications, 61:59–80, DOI: 10.1016/j.jnca. 2015.10.005.

Aslam, M. U., Derhab, A., Saleem, K., Abbas, H., Orgun, M., Iqbal, W. & Aslam, B. (2017). A Survey of Authentication Schemes in Telecare Medicine Information Systems. Journal of Medical Systems 41(1), 14, DOI: 10.1007/s10916-016-0658-3

Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M. & Rajarajan, M. (2015). Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys and Tutorials 17(2), 998–1022, DOI: 10.1109/COMST.2014.2386139

Gandotra, P., Kumar, Jha R. & Jain, S. (2017). A survey on device-to-device (D2D) communication: Architecture and security issues. ACM Journal of Network and Computer Applications 78, 9–29, DOI: 10.1016/j.jnca.2016.11.002

Harris, M. A. & Patten, K. P. (2014). Mobile device security considerations for small- and medium-sized enterprise business mobility. Information Management and Computer Security, 22(1), 97–114, DOI 10.1108/IMCS-03-2013-0019

Khan, W. Z., Xiang, Y., Aalsalem. M. Y. & Arshad, Q. (2013). Mobile Phone Sensing Systems: A Survey. IEEE Communications Surveys & Tutorials 15(1), 402–427.

Meng, W., Wong, D. S., Furnell, S. & Zhou, J. (2015). Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Communications Surveys & Tutorials 17(3):1268–1293,DOI: 10.1109/COMST.2014.2386915

Patel, V. M., Chellappa, R., Chandra, D. & Barbello, B. (2016). Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges. IEEE Signal Processing Magazine, 33(4), 49–61.

Qin, Z., Sun, J., Wahaballa, A., Zheng, W., Xiong, H. & Qin Z. (2017). A secure and privacy preserving mobile wallet with outsourced verification in cloud computing. ACM Journal of Computer Standards & Interfaces, 54, 55– 60, DOI: 10.1016/j.csi.2016.11.012

Spreitzer, R., Moonsamy, V., Korak, T. & Mangard, S. (2018 ). Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices. IEEE Communications Surveys and Tutorials, 20(1), 465 - 488, DOI: 10.1109/COMST.2017.2779824.

Teh, P. S., Zhang, N., Teoh, A. B. J. & Chen K (2016). A survey on touch dynamics authentication in mobile devices. Elsevier Journal of Computers and Security, 59, 210– 235, DOI: 10.1016/j.cose.2016.03.003

Velásquez, I., Caro, A. & Rodríguez, A. (2018). Authentication schemes and methods: A systematic literature review. Elsevier Journal of Information and Software Technology, 94:30– 37, DOI: 10.1016/j.infsof.2017.09.012

Downloads

Published

2019-12-12 — Updated on 2019-12-31

How to Cite

An Enhanced Bilateral Authentication System for Android Devices. (2019). Fountain Journal of Natural and Applied Sciences, 8(2). https://doi.org/10.53704/fujnas.v8i2.283