Review Article

Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

Table 1

Synopsis of knowledge-based schemes.

ModalitiesAuthentication typesUsability pros and cons indicatedSecurity solutions or concerns reported

PIN [57, 60, 62]; password [53, 60]; pattern [60, 64]One-shot; static; periodic; single sign-on; unimodal[48, 52ā€“57, 60, 62, 71, 72][58, 61ā€“70]