An Enhanced Bilateral Authentication System for Android Devices
DOI:
https://doi.org/10.53704/fujnas.v8i2.283Abstract
Authentication is a method that verifies that users or systems are who they claim to be, based on identity of any form. Smart devices are often lost or stolen; password could be easily detected or hacked. Most of the new model smart devices have inbuilt security for authentication which most times do not work perfectly. For that purpose, high level of authentication for smart devices is needed. The need to ensure security of information on these devices is highly necessary and at the same time difficult. This work developed an enhanced authentication system for android based mobile devices to increase the security level and confidentiality of its information which enables user-friendliness environment. It combines face recognition methods with pin or pattern which makes it more robust and reliable in securing our mobile devices. The implementation was done using Schulz Android Studio SDK and developed with the following programming languages: JavaScript, XML (Extensible Markup Language), OpenCV, and Java. The developed application can be installed and work on any mobile device with the latest android operating system and its backward compatible. The system was tested on different smart devices from different vendors and its efficiency is above 90%. Evaluating the application with some existing systems was done in order to ascertain the reliability of the solution and strengthen it. The system tagged MULTILOCK enables users to register more than one user, and gain access to the device with either pin or pattern together with a registered faces.
Keywords: Face detection, Security, Mobile devices, Confidentiality, Pin, Pattern
References
Agrawal, A. & Patidar, A. (2014). Smart Authentication for smart phones. International Journal of Computer Science and Information Technologies 5 (4), 4839-4843.
Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S. & Sakurai, K. (2016). Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications, 61:59–80, DOI: 10.1016/j.jnca. 2015.10.005.
Aslam, M. U., Derhab, A., Saleem, K., Abbas, H., Orgun, M., Iqbal, W. & Aslam, B. (2017). A Survey of Authentication Schemes in Telecare Medicine Information Systems. Journal of Medical Systems 41(1), 14, DOI: 10.1007/s10916-016-0658-3
Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M. & Rajarajan, M. (2015). Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys and Tutorials 17(2), 998–1022, DOI: 10.1109/COMST.2014.2386139
Gandotra, P., Kumar, Jha R. & Jain, S. (2017). A survey on device-to-device (D2D) communication: Architecture and security issues. ACM Journal of Network and Computer Applications 78, 9–29, DOI: 10.1016/j.jnca.2016.11.002
Harris, M. A. & Patten, K. P. (2014). Mobile device security considerations for small- and medium-sized enterprise business mobility. Information Management and Computer Security, 22(1), 97–114, DOI 10.1108/IMCS-03-2013-0019
Khan, W. Z., Xiang, Y., Aalsalem. M. Y. & Arshad, Q. (2013). Mobile Phone Sensing Systems: A Survey. IEEE Communications Surveys & Tutorials 15(1), 402–427.
Meng, W., Wong, D. S., Furnell, S. & Zhou, J. (2015). Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Communications Surveys & Tutorials 17(3):1268–1293,DOI: 10.1109/COMST.2014.2386915
Patel, V. M., Chellappa, R., Chandra, D. & Barbello, B. (2016). Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges. IEEE Signal Processing Magazine, 33(4), 49–61.
Qin, Z., Sun, J., Wahaballa, A., Zheng, W., Xiong, H. & Qin Z. (2017). A secure and privacy preserving mobile wallet with outsourced verification in cloud computing. ACM Journal of Computer Standards & Interfaces, 54, 55– 60, DOI: 10.1016/j.csi.2016.11.012
Spreitzer, R., Moonsamy, V., Korak, T. & Mangard, S. (2018 ). Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices. IEEE Communications Surveys and Tutorials, 20(1), 465 - 488, DOI: 10.1109/COMST.2017.2779824.
Teh, P. S., Zhang, N., Teoh, A. B. J. & Chen K (2016). A survey on touch dynamics authentication in mobile devices. Elsevier Journal of Computers and Security, 59, 210– 235, DOI: 10.1016/j.cose.2016.03.003
Velásquez, I., Caro, A. & Rodríguez, A. (2018). Authentication schemes and methods: A systematic literature review. Elsevier Journal of Information and Software Technology, 94:30– 37, DOI: 10.1016/j.infsof.2017.09.012
Downloads
Published
Issue
Section
License
Copyright (c) 2020 Mutiat Adebukola Ogunrinde

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright of their work, with first publication rights granted to Fountain Journal of Natural and Applied Sciences. Articles in FUJNAS are published on the Creative Commons Attribution 4.0 International license (CC BY 4.0).