Affiliation:
1. Deenbandhu Chhotu Ram University of Science and Technology
Abstract
Abstract
Data authentication is vital nowadays, as the development of the internet and its applications allow users to have all-time data availability, attracting attention towards security and privacy and leading to authenticating legitimate users. We have diversified means to gain access to our accounts, like passwords, biometrics, and smartcards, even by merging two or more techniques or various factors of authentication. This paper presents a systematic literature review of papers published from 2010 to 2022 and gives an overview of all the authentication techniques available in the market. Our study provides a comprehensive overview of all three authentication techniques with all the performance metrics (Accuracy, Equal Error Rate (EER), False Acceptance Rate (FAR)), security, privacy, memory requirements, and usability (Acceptability by user)) that will help one choose a perfect authentication technique for an application. In addition, the study also explores the performance of multimodal and multi-factor authentication and the application areas of authentication.
Publisher
Research Square Platform LLC
Reference156 articles.
1. 1. Shah, S. W., & Kanhere, S. S. (2019). Recent Trends in User Authentication – A Survey. In IEEE Access (Vol. 7, pp. 112505–112519). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/access.2019.2932400
2. 2. Das, A. K., Zeadally, S., & Wazid, M. (2017). Lightweight authentication protocols for wearable devices. In Computers & Electrical Engineering (Vol. 63, pp. 196–208). Elsevier BV. https://doi.org/10.1016/j.compeleceng.2017.03.008
3. 3. Velásquez, I., Caro, A., & Rodríguez, A. (2018). Authentication schemes and methods: A systematic literature review. In Information and Software Technology (Vol. 94, pp. 30–37). Elsevier BV. https://doi.org/10.1016/j.infsof.2017.09.012
4. 4. How do authentication process work. https://indiancybersecuritysolutions.com/how-do-authentication-process-work/[Accessed Feb, 2022]
5. 5. Walton, S. (1995). Image authentication for a slippery new age. Dr. Dobb's Journal, 20(4), 18–26.