دانلود مقاله انگلیسی رایگان:بررسی روش بهینه برای تولید و تأیید اثر انگشت گوشی هوشمند: یک بررسی - 2020
بلافاصله پس از پرداخت دانلود کنید
دانلود مقاله انگلیسی حقوق خصوصی رایگان
  • Investigation of the optimal method for generating and verifying the Smartphone’s fingerprint: A review Investigation of the optimal method for generating and verifying the Smartphone’s fingerprint: A review
    Investigation of the optimal method for generating and verifying the Smartphone’s fingerprint: A review

    سال انتشار:

    2020


    عنوان انگلیسی مقاله:

    Investigation of the optimal method for generating and verifying the Smartphone’s fingerprint: A review


    ترجمه فارسی عنوان مقاله:

    بررسی روش بهینه برای تولید و تأیید اثر انگشت گوشی هوشمند: یک بررسی


    منبع:

    Sciencedirect - Elsevier - Journal of King Saud University - Computer and Information Sciences, Corrected proof. doi:10.1016/j.jksuci.2020.06.007


    نویسنده:

    Shikah J. Alsunaidi ⇑, Abdullah M. Almuhaideb


    چکیده انگلیسی:

    The technical transformation and transfer of most services to digital platforms require that everyone has an electronic device connected to the Internet to assist them accomplish their tasks. Smartphones are one of the best options for everyone because of their small size and ease of transport, in addition to their high capabilities equivalent to a personal computer. It is necessary to identify these devices, usually by checking their IMEI (International Mobile Equipment Identity), to provide and manage several services like the cellular network service. On the other hand, criminals and counterfeiters can manipulate this identity to hide the device and prevent it from being tracked or to make high profits from selling substandard devices. Therefore, several recent proposals have emerged to create a strong fingerprint for use in device identification purposes. This paper reviews and discusses the existing methods to generate a device identity and defines their gaps. Also, it classifies the methods into four categories based on the used technique, namely PUF, machine learning, comparison approach, and sensor calibration. Additionally, it introduces the factors to consider when choosing the technique of device identification. It provides a list of possible attacks on each technology used in device identification methods.
    Keywords: Device identification | IMEI cloning | ICMetric | Fingerprinting | Identity verification | PUF


    سطح: متوسط
    تعداد صفحات فایل pdf انگلیسی: 14
    حجم فایل: 736 کیلوبایت

    قیمت: رایگان


    توضیحات اضافی:




اگر این مقاله را پسندیدید آن را در شبکه های اجتماعی به اشتراک بگذارید (برای به اشتراک گذاری بر روی ایکن های زیر کلیک کنید)

تعداد نظرات : 0

الزامی
الزامی
الزامی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi