Skip to main content
Log in

Efficiency of Paid Authentication Methods for Mobile Devices

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Collecting sensor data through wireless Internet protocol with cloud computing is a new IT architecture and many applications are adopting similar framework of Internet of Things based on it. For sensor devices, cloud environment can be applied to reduce their computing resource limitations to store, index and process their data. Besides, there are several concerns on communication between them in terms of security and privacy issues. In this paper, we focus on paid user authentication methods for the communication in Korea. System managers’ survey on their preferences based on given criteria shows overall priority of security investment. Survey results show system experts have diverse opinions on paid authentication methods based on convenience, security level and operational cost. To review the current challenges of paid authentication method, we scrutinize recent survey results on authentication methods in terms of Internet of Everything framework. Also we compare the well-defined data security requirements in Internet services with current devices to check its compatibility to protect personal data from the security perspective.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610–613.

    Article  Google Scholar 

  2. Armbrust, M., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50–58.

    Article  Google Scholar 

  3. Camp, O., et al. (Ed.). Information systems security and privacy: First International Conference, ICISSP 2015, Angers, France, February 9–11, 2015, Revised Selected Papers. Springer, 2015.

  4. Cardenas, A. A. et al. (2008). Research challenges for the security of control systems. In Proceedings of the 3rd conference on Hot topics in Security, 2008.

  5. Cirani, S., et al. (2015). IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios. IEEE Sensors Journal, 15(2), 1224–1234.

    Article  Google Scholar 

  6. Gordon, L. A., & Loeb, M. P. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438–457.

    Article  Google Scholar 

  7. Gubbi, J., et al. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.

    Article  Google Scholar 

  8. Kim, W. (2009). Cloud computing: Today and tomorrow. Journal of Object Technology, 8(1), 65–72.

    Article  Google Scholar 

  9. KISA. (2015). Survey on industrial security activities in 2015. http://isis.kisa.or.kr/board/?pageId=060200&bbsId=15&itemId=53&pageIndex=1.

  10. Mell, P., Grance, T. (2010). The NIST definition of cloud computing. Communications of the ACM, 53(6), 50.

    Google Scholar 

  11. Miorandi, D., et al. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.

    Article  Google Scholar 

  12. Popovic, K., Hocenski, Z. (2010). Cloud computing security issues and challenges. In MIPRO, 2010 proceedings of the 33rd international convention. IEEE, pp. 344–349.

  13. Purser, S. A. (2004). Improving the ROI of the security management process. Computers and Security, 23(7), 542–546.

    Article  Google Scholar 

  14. Yao, X., et al. (2013). A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sensors Journal, 13(10), 3693–3701.

    Article  Google Scholar 

  15. Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7–18.

    Article  Google Scholar 

Download references

Acknowledgments

This research was supported by a 2015 Research Grant from SangMyung University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeong Yeon Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, J.Y. Efficiency of Paid Authentication Methods for Mobile Devices. Wireless Pers Commun 93, 543–551 (2017). https://doi.org/10.1007/s11277-016-3286-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3286-9

Keywords

Navigation