Investigation of the optimal method for generating and verifying the Smartphone’s fingerprint: A review
Autor: | Abdullah M. Almuhaideb, Shikah J. Alsunaidi |
---|---|
Rok vydání: | 2022 |
Předmět: |
Service (systems architecture)
General Computer Science business.industry Computer science Fingerprint (computing) 020206 networking & telecommunications 02 engineering and technology Identification (information) Transformation (function) Human–computer interaction Personal computer 0202 electrical engineering electronic engineering information engineering Cellular network Identity (object-oriented programming) 020201 artificial intelligence & image processing The Internet business |
Zdroj: | Journal of King Saud University - Computer and Information Sciences. 34:1919-1932 |
ISSN: | 1319-1578 |
Popis: | The technical transformation and transfer of most services to digital platforms require that everyone has an electronic device connected to the Internet to assist them accomplish their tasks. Smartphones are one of the best options for everyone because of their small size and ease of transport, in addition to their high capabilities equivalent to a personal computer. It is necessary to identify these devices, usually by checking their IMEI (International Mobile Equipment Identity), to provide and manage several services like the cellular network service. On the other hand, criminals and counterfeiters can manipulate this identity to hide the device and prevent it from being tracked or to make high profits from selling substandard devices. Therefore, several recent proposals have emerged to create a strong fingerprint for use in device identification purposes. This paper reviews and discusses the existing methods to generate a device identity and defines their gaps. Also, it classifies the methods into four categories based on the used technique, namely PUF, machine learning, comparison approach, and sensor calibration. Additionally, it introduces the factors to consider when choosing the technique of device identification. It provides a list of possible attacks on each technology used in device identification methods. |
Databáze: | OpenAIRE |
Externí odkaz: |