Open Access Open Access  Restricted Access Subscription Access

Security Reinforcement: An Overview of Multilevel Authentication Techniques


Affiliations
1 Faculty of Science and Engineering, University of Nottingham Malaysia, Jalan Broga, 43500 Semenyih, Selangor Darul Ehsan, Malaysia

Authentication mechanisms play a critical role in safeguarding against unauthorized access in today's mobile operating systems. This paper presents a comprehensive review of existing authentication methods tailored for mobile devices, aiming to elucidate their functionalities and security considerations. The study meticulously examines a spectrum of authentication techniques available for smart devices, shedding light on their respective features and implementation within mobile operating systems. Additionally, it scrutinizes the associated security risks specific to these methods. By providing an in-depth analysis of prevalent authentication approaches, this research aims to offer valuable insights into the landscape of available techniques for securing mobile devices, aiding both users and practitioners in making informed decisions regarding their adoption.

Keywords

Authentication, multi-level authentications, mobile devices.
User
Notifications
Font Size

Abstract Views: 110




  • Security Reinforcement: An Overview of Multilevel Authentication Techniques

Abstract Views: 110  | 

Authors

Thamilvaani Arvaree
Faculty of Science and Engineering, University of Nottingham Malaysia, Jalan Broga, 43500 Semenyih, Selangor Darul Ehsan, Malaysia

Abstract


Authentication mechanisms play a critical role in safeguarding against unauthorized access in today's mobile operating systems. This paper presents a comprehensive review of existing authentication methods tailored for mobile devices, aiming to elucidate their functionalities and security considerations. The study meticulously examines a spectrum of authentication techniques available for smart devices, shedding light on their respective features and implementation within mobile operating systems. Additionally, it scrutinizes the associated security risks specific to these methods. By providing an in-depth analysis of prevalent authentication approaches, this research aims to offer valuable insights into the landscape of available techniques for securing mobile devices, aiding both users and practitioners in making informed decisions regarding their adoption.

Keywords


Authentication, multi-level authentications, mobile devices.