User Authentication Architecture For Mobile Devices

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

precise and clear authentication system that

User authentication guarantees safety beyond the point of


architecture for mobile entry.

devices; A cultural
approach
Abstract
As the usefulness and administrations
provided by portable gadgets increments, it The use of passwords and PINS has been
is all the more important to have a prevalent through a number of years. In the
successful user authentication system to current age, with a spiraling increase in
provide the users safety against internet-connected devices and possession
mishandling of private information. This of number of accounts by users, it has
paper proposes the use of password-based become increasingly difficult to remember
and password-less authentication systems all the passwords. Hence, the trend to
and how their implementation differs move towards more secure password-less
through various cultures. Over the years, authentication has seen a massive incline.
password have been the main safeguards (Cortopassi, M., Edward, E., 2013). The
for most of the people against unauthorized password-less approach to authentication
access, but with the advancement in also commonly known as biometrics does
technology there arises different password- not require the user to remember anything
less user authentication methods where but it only requires the usage of one of the
there is potentially no risk of stealing, physical features of the user, be it their
hacking and cracking of passwords. fingerprint, facial ID or the retinal scan.
Despite all the advantages and Even though this form of authentication is
disadvantages that the two types of much less complicated but it brings with it,
authentication systems bring with them, its own set of disadvantages.
the crux of the matter remains that their Biometric captures and stores the essence
design and implementation is based on the of one’s self and it has been contended that
regulations and cultural background of any biometrics are an inalienably emotive and
specific area. morally challenging innovation that can be
Keywords: biometrics, password-based used for nefarious purposes against one’s
authentication, cross-cultural differences. wishes. (Alterman, 2003). The use of
biometrics is seen as invasive in one
Introduction: culture and it may be seen as less
In the current world of technology, mobiles complicating in another culture, based on
phones are not just considered to be a the views of population living there and the
simple tool that handles the telephonic regulations placed within the country.
communication but are capable of This paper presents a cross-cultural
providing a range of data-centric services. approach towards biometrics and
These services include but are not limited password-based authentication. The
to transferring money, managing bank purpose of this study is to understand
accounts, surfing internet and paying for various biometric technologies and their
various products. With increased comparisons with the password-based
functionality, there arises a need for strong, authentication systems, and to understand
the relationship between culture and two sub-categories of voice recognition;
implementation of authentication speech recognition and speaker
technologies. The reasons for some recognition. Where the speaker recognition
societies discouraging the use of technology only authenticates the voice
biometrics and others encouraging it will features of the person trying to access the
be discussed in end. device, there the speech recognition
authentication also helps to understand the
Biometric authentication:
words uttered by the person. (Yuanchun
Biometric system uses the physiological shi., Xie., et al. 2003)
and anatomical features of the users to
confirm their identity. It actually makes
sure that only the actual user is accessing The last in the list is retinal scan
the device instead of any preparator who authentication. It depends on the design of
has the password or PIN of the user. In this the vein present in the retina of human eye
section various biometric authentication and this technology is used very sparingly
technologies are discussed and later the in high-security devices.
perspective of user is discussed regarding
There are two very distinct groups
the biometric authentication versus the
regarding the use of authentication
password-based authentication.
technologies; the pro-biometric technology
The first in the list is the authentication group and the pro-password-based
using the fingerprints. It is an easy, yet authentication group. In early years,
secure authentication method since every biometrics as a whole were perceived to be
person has a unique set of finger prints. All significantly less acceptable than
the user has to do is press their finger on passwords. (Deane, et al. 1995). Though,
the designated sensor present on most of with passing time this perception started
the smart phones nowadays. The sensor changing. In a study conducted in 2004,
analyzes the unique pattern of ridges, with participants from Finland, Germany
valleys and minutia points on fingers and and Spain, it was concluded that 55%
then locally creates a unique key pair to people had a positive attitude towards the
unlock the device. (Chohan, R., Tanwar, use of biometrics and 25% people were of
R., 2019) the opinion that using biometrics might
negatively affect their health. (BioSec,
The next is selfie authentication service
2004). During this survey, cross-cultural
which is facial recognition technology.
differences regarding the implementation
Camera application of the device is used to
of biometrics was also observed. It was
capture the face of user in real-time. This
observed that people of Germany had a
picture is then compared with the one
more positive approach towards
provided within the date. If the pictures
biometrics, in contrast to the people of
match the phone is unlocked. This
Spain and Finland who were more
technology is designed to overlook the
comfortable with using passwords.
differences in the face due to age or other
factors. Culture and authentication technologies:
Voice prints technology provides a safe As described in the above research, there
way to access the device through voice was a distinct link between cultures and the
recognition. The voice of the person trying usage of authentication technologies. In
to unlock the phone is compared with the this section of the research paper, quotes
voice print stored on the device. There are from people of India, South Africa, and
United Kingdom regarding their take on resources to beat any system, and I don’t
the use of biometric technology instead of think biometric technology is any different.
password-based technology will be used to (Riley, C., Buckner, K., Johnson, G.,
prove the varying affects of culture of an Benyon, D. 2009)
area on the opinions of population
regarding the usage of authentication Now these quotes from general population
technology. of South Africa clearly shows different
cultural values. They interpret the
“biometrics would be one of the most technology in a completely different way
secure methods of identification” than the Indians. Their society is much
more prone to crime and thus the people
“I think biometric technologies are very fear how the use of this technologies will
safe and reliable to use for personal affect their personal safety. For example, if
identification of an individual instead of a thief was to stole their mobile, he would
passwords. It ensures protection against also need them to actually open that mobile
unauthorized access.” if they were using biometric technology,
hence their life could be in immense
The above-mentioned quotes are taken danger every time they walk out of the
from general public of India. (Riley, C., house. This is a risk that an average South
Buckner, K., Johnson, G., Benyon, D. African is not willing to take and thus they
2009). These quotes show that people of stick with password-based authentication.
India are generally satisfied with the use
biometrics instead of passwords. Now I am concerned about the reliability of the
there can be number of reasons for this equipment of and personal consequences
cultural acceptance of biometrics. The of system failure.”
chief among them is the trend in India to
(Riley, C., Buckner, K., Johnson, G.,
encourage the youngsters to get their
Benyon, D. 2009)
education in information technology. Their
government provides incentives to those Now, in United Kingdom where there is
who masters in technology and thus neither the danger of uncontrolled crime,
general population is encouraged to accept nor there is high level of illiteracy, the least
all the new technologies without actually number of people voted in favor of
thinking through the problems that are biometric authentication system. This is
associated with them. Another reason because in their culture, the children are
might be the high illiteracy rate within taught from a very young age to not follow
India. Almost everyone in India carries a anything blindly and to make their own
smart phone, even those who are not very decision. This makes them question the
literate and they also want to protect their safety of biometric system and how their
phones from unauthorized access. Hence, data will be used once it is captured. They
they prefer biometrics instead of think that the government or other
remembering long-winded passwords that organizations might access their
is very difficult for them. Due to these fingerprints and use them for other
cultural differences, people of India prefer purposes such as accessing their private
biometrics instead of passwords. information. For example, in China the
biometric technology is being used to
“my main concern is safety- if my body
heavily control the population and also a
parts are like access keys, there is a threat
DNA registry is being made over there
to me?”
which is ethically very wrong.
“there are some criminals that pay more (Comparitech, 2021)
attention to details in their profession than
Discussions:
law-abiding folks do to theirs. They have
From the above examples it is seen that
people of three different countries view the
same technology in a different light due to
their varying cultural backgrounds.

(Riley, C., Buckner, K., Johnson, G.,


Benyon, D. 2009)
Varying levels of information about the
biometrics in different societies might also
be a reason of cross-cultural contrast that is It is possible that as people grows more
witnessed. Since more Indians are familiar aware of the technology with passing time,
with the technology as 46% of Indian some of their fears might dissipate and
undergraduate studies technology they might warm up to the newer
compared to only 37% of British students technology as compared to the
(Royal Society, 2006), a greater proportion authentication by passwords.
of Indians reacted favorably towards
biometrics as compared to password-based Conclusion:
authentication. The graph below from The security of mobile devices is a major
(Riley, C., Buckner, K., Johnson, G.,
concern for all the users as their mobile is a
Benyon, D. 2009) also stresses on this
point. host for a lot of personal data. This security
was provided by passwords and PINS
since a very long time. But with an
introduction of newer technologies, people
are genuinely divided regarding its
usefulness. The design companies should
keep in mind the cross-cultural differences
in peoples’ opinions before implementing
any authentication technology. This will
not only help satisfy the customers but also
keep them in profits.
References:
1. Riley, C., Buckner, K., Johnson,
G., Benyon, D. (2009) Culture and
Biometrics: Regional differences in
perception of biometric
authentication technologies.
2. Biometric data: 96 countries ranked
by how they are collecting it and
what they are doing with it.
Retrieved by:
http://www.comparitech.com/
blog/vpn-privacy/biometric-data-
study/
3. Chohan, R., Tanwar, R., (2019)
password-less authentication:
methods for user verification and
identification to login securely over
remote sites.
4. N.L. Clarke, S.M. Furnell, (2006).
A composite user authentication
architecture for mobile devices.
Journal of Information warfare,
2(5), 11-29.

You might also like