Version 1
: Received: 31 October 2024 / Approved: 31 October 2024 / Online: 1 November 2024 (10:16:24 CET)
How to cite:
Hasan, S. S. U.; Ghani, A.; Daud, A.; Akbar, H.; Khan, M. F. A Review on Secure Authentication Mechanisms for Mobile
Security. Preprints2024, 2024110020. https://doi.org/10.20944/preprints202411.0020.v1
Hasan, S. S. U.; Ghani, A.; Daud, A.; Akbar, H.; Khan, M. F. A Review on Secure Authentication Mechanisms for Mobile
Security. Preprints 2024, 2024110020. https://doi.org/10.20944/preprints202411.0020.v1
Hasan, S. S. U.; Ghani, A.; Daud, A.; Akbar, H.; Khan, M. F. A Review on Secure Authentication Mechanisms for Mobile
Security. Preprints2024, 2024110020. https://doi.org/10.20944/preprints202411.0020.v1
APA Style
Hasan, S. S. U., Ghani, A., Daud, A., Akbar, H., & Khan, M. F. (2024). A Review on Secure Authentication Mechanisms for Mobile
Security. Preprints. https://doi.org/10.20944/preprints202411.0020.v1
Chicago/Turabian Style
Hasan, S. S. U., Habib Akbar and Muhammad Faizan Khan. 2024 "A Review on Secure Authentication Mechanisms for Mobile
Security" Preprints. https://doi.org/10.20944/preprints202411.0020.v1
Abstract
Cybersecurity, compliments authentication, has become the backbone of the Internet of 1
Things. In the authentication process, the word authentication is of the utmost importance as it is 2
the door through which both Mr. Right Guy and Mr. Wrong Guy can pass. It’s the key to opening 3
the most important and secure accounts worldwide. When authentication is complete, surely there 4
will be passwords. The passwords are the brain-confusing options for the user to choose when 5
making an account and during the registration/sign-up process. Graphical passwords overcome 6
the difficulties of textual passwords. This article reviews different threats to users’ passwords and 7
categorizes different authentication schemes proposed by researchers to secure password systems 8
against attacks. Standard data sets and performance evaluation measures are also studied. Finally, 9
research gaps and future directions in this essential and hot area of research are discussed.
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.