Authentication Methods that use Haptic and Audio: A Review

YHS Kam, JJ Chin

Research output: Contribution to conferenceConference paper (not formally published)peer-review

Abstract

Authentication is an important step for many applications eg. banking, communications etc. Identity theft can happen because the systems that we use are vulnerable to observation attacks both by a person (shoulder surfing) and also video recordings. Thus authentication methods that rely on the visual channel alone, which are displayed onscreen are more susceptible to shoulder surfing. In this paper, a review of haptic and audio authentication methods is presented where we describe and analyse various methods that utilise non-visual channels, namely haptic and audio, for authentication. We categorise the methods into the categories of recall, recognition and challenge-response. We focus on the security aspects of the methods, comparing the susceptibility of the methods to various attacks. The review indicates that most haptic and audio methods are less susceptible to observation attacks and intersection attacks.
Original languageEnglish
Publication statusPublished - 1 Jan 2022

Fingerprint

Dive into the research topics of 'Authentication Methods that use Haptic and Audio: A Review'. Together they form a unique fingerprint.

Cite this