Skip to main content

Architectures to Implement In-Air Signature Mobile Authentication to Increase the Security of E-Commerce Applications and Opinion of End Users

  • Conference paper
Book cover Digital Enterprise and Information Systems (DEIS 2011)

Abstract

This article proposes to include an in-air signature biometric technique in mobile e-commerce applications in order to increase the security of passwords and authenticate users directly from their mobile phones. Five architectures have been proposed to implement this technique as a complement of current authentication methods. Moreover, the opinion of end users has been considered assessed by a survey of 24 people. From the results of this survey it has been deducted that this authentication method seems useful, necessary and comfortable to complement the password authentication methods and increase the global security of e-commerce applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chirillo, J., Blaul, S.: Implementing Biometric Security, 1st edn. Hungry Minds (2003) (incorporated)

    Google Scholar 

  2. Jain, A.K., Flynn, P., Ross, A.A.: Handbook of Biometrics. Springer-Verlag New York, Inc., Secaucus (2007)

    Google Scholar 

  3. ho Cho, D., Park, K.R., Rhee, D.W., Kim, Y., Yang, J.: Pupil and iris localization for iris recognition in mobile phones. In: International Workshop on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, International Conference on & Self-Assembling Wireless Networks, pp. 197–201 (2006)

    Google Scholar 

  4. Jeong, D., Park, H.A., Park, K., Kim, J.: Iris recognition in mobile phone based on adaptive gabor filter. In: Zhang, D., Jain, A.K. (eds.) ICB 2005. LNCS, vol. 3832, pp. 457–463. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Kurkovsky, S., Carpenter, T., MacDonald, C.: Experiments with simple iris recognition for mobile phones. In: Third International Conference on Information Technology: New Generations, pp. 1293–1294 (2010)

    Google Scholar 

  6. Jeong, D.S., Park, H.A., Park, K.R., Kim, J.: Iris recognition in mobile phone based on adaptive gabor filter. In: Proceedings of the Advances in Biometrics, International Conference, ICB 2006, Hong Kong, China, January 5-7, pp. 457–463 (2006)

    Google Scholar 

  7. Tao, Q., Veldhuis, R.: Biometric authentication for a mobile personal device. In: Annual International Conference on Mobile and Ubiquitous Systems, pp. 1–3 (2006)

    Google Scholar 

  8. yi Han, S., Park, H.A., Cho, D.H., Park, K.R., Lee, S.: Face recognition based on near-infrared light using mobile phone. In: Beliczynski, B., Dzielinski, A., Iwanowski, M., Ribeiro, B. (eds.) ICANNGA 2007. LNCS, vol. 4432, pp. 440–448. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Ijiri, Y., Sakuragi, M., Lao, S.: Security management for mobile devices by face recognition. In: 7th International Conference on Mobile Data Management, MDM 2006, pp. 49–49 (May 2006)

    Google Scholar 

  10. Shabeer, H.A., Suganthi, P.: Mobile phones security using biometrics. In: International Conference on Computational Intelligence and Multimedia Applications, vol. 4, pp. 270–274 (2007)

    Google Scholar 

  11. Lapère, M., Johnson, E.: User authentication in mobile telecommunication environments using voice biometrics and smartcards. In: Besson, M., Gobbi, R., Reed, R., Campolargo, M., Mullery, A. (eds.) IS&N 1997. LNCS, vol. 1238, pp. 437–443. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  12. Mantyjarvi, J., Lindholm, M., Vildjiounaite, E., Makela, S.M., Ailisto, H.A.: Identifying users of portable devices from gait pattern with accelerometers. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), vol. 2, pp. ii/973–ii/976 (2005)

    Google Scholar 

  13. Iso, T., Yamazaki, K.: Gait analyzer based on a cell phone with a single three-axis accelerometer. In: MobileHCI 2006: Proceedings of the 8th Conference on Human-computer Interaction with Mobile Devices and Services, pp. 141–144. ACM, New York (2006)

    Google Scholar 

  14. Clarke, N., Furnell, S.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security 6, 1–14 (2007)

    Article  Google Scholar 

  15. Saevanee, H., Bhatarakosol, P.: User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In: International Conference on Computer and Electrical Engineering, pp. 82–86 (2008)

    Google Scholar 

  16. Guerra-Casanova, J., Sánchez-Ávila, C., de Santos-Sierra, A., del Pozo, G.B., Jara-Vera, V.: A real-time in-air signature biometric technique using a mobile device embedding an accelerometer. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds.) NDT (1). CCIS, vol. 87, pp. 497–503. Springer, Heidelberg (2010)

    Google Scholar 

  17. Karnan, M., Krishnaraj, N.: Bio password keystroke dynamic approach to secure mobile devices. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–4, ID: 1 (2010)

    Google Scholar 

  18. Xing, S., Xue, H., Yan, X.: Research on model of biometric identification emergency response in electronic commerce. In: International Conference on Management of e-Commerce and e-Government, ICMECG 2008, pp. 185–188, ID: 1 (2008)

    Google Scholar 

  19. Lu, H., Claret-Tournier, F., Chatwin, C., Young, R.C.D.: M-commerce secured using web-enabled mobile biometric agents. In: 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology Workshops, pp. 480–483, ID: 1 (2007)

    Google Scholar 

  20. Wang, J., Yuan, S.: A novel security mobile payment system based on watermarked voice cheque. In: 2005 2nd International Conference on Mobile Technology, Applications and Systems, p. 4, ID: 1 (2005)

    Google Scholar 

  21. Vangala, R.R., Sasi, S.: Biometric authentication for e-commerce transaction. In: 2004 IEEE International Workshop on Imaging Systems and Techniques (IST), pp. 113–116, ID: 1 (2004)

    Google Scholar 

  22. Rahimi, A., Mohammadi, S., Rahimi, R.: An efficient iris authentication using chaos theory-based cryptography for e-commerce transactions. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009, pp. 1–6, ID: 1 (2009)

    Google Scholar 

  23. Dowling, S., Nancy Paxton, J.H.: Apple reports first quarter results (2009)

    Google Scholar 

  24. Guo, J., Doermann, D., Rosenfeld, A.: Local correspondence for detecting random forgeries. In: International Conference on Document Analysis and Recognition, p. 319 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Guerra-Casanova, J., Sánchez-Ávila, C., Jara-Vera, V., de-Santos-Sierra, A., Bailador, G. (2011). Architectures to Implement In-Air Signature Mobile Authentication to Increase the Security of E-Commerce Applications and Opinion of End Users. In: Ariwa, E., El-Qawasmeh, E. (eds) Digital Enterprise and Information Systems. DEIS 2011. Communications in Computer and Information Science, vol 194. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22603-8_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22603-8_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22602-1

  • Online ISBN: 978-3-642-22603-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics