Preprint Review Version 1 This version is not peer-reviewed

A Review on Secure Authentication Mechanisms for Mobile Security

Version 1 : Received: 31 October 2024 / Approved: 31 October 2024 / Online: 1 November 2024 (10:16:24 CET)

How to cite: Hasan, S. S. U.; Ghani, A.; Daud, A.; Akbar, H.; Khan, M. F. A Review on Secure Authentication Mechanisms for Mobile Security. Preprints 2024, 2024110020. https://doi.org/10.20944/preprints202411.0020.v1 Hasan, S. S. U.; Ghani, A.; Daud, A.; Akbar, H.; Khan, M. F. A Review on Secure Authentication Mechanisms for Mobile Security. Preprints 2024, 2024110020. https://doi.org/10.20944/preprints202411.0020.v1

Abstract

Cybersecurity, compliments authentication, has become the backbone of the Internet of 1 Things. In the authentication process, the word authentication is of the utmost importance as it is 2 the door through which both Mr. Right Guy and Mr. Wrong Guy can pass. It’s the key to opening 3 the most important and secure accounts worldwide. When authentication is complete, surely there 4 will be passwords. The passwords are the brain-confusing options for the user to choose when 5 making an account and during the registration/sign-up process. Graphical passwords overcome 6 the difficulties of textual passwords. This article reviews different threats to users’ passwords and 7 categorizes different authentication schemes proposed by researchers to secure password systems 8 against attacks. Standard data sets and performance evaluation measures are also studied. Finally, 9 research gaps and future directions in this essential and hot area of research are discussed.

Keywords

Authentication Schemes; Secure Passwords; Threats; Password Attacks; Cybersecurity; 11 Mobile Security

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.