User Authentication Using React Native Application

Authors

  • Rishabh Agrawal
  • Deepak Moud

Keywords:

Biometric, Server, Data Security, Password Authentication, Mobile Devices, GUI

Abstract

Due to the advancement of mobile and technology have gained their speed along with this fast-growing era of the internet, many of us started using smartphones and tablets to perform sensitive operations, such as making in-app payments. When we consider all tasks, we perform on mobile devices, and the information it has access to, we can easily understand about user information security need. The password authentication systems currently prevailing cannot determine the authorization of the user, as the same password can also be used by an unauthorized person, if it gets into the wrong hands, the sensitive data can leak and may lead to many undesirable consequences. As a result, Biometric authentication started gaining popularity, as putting your fingertip to a touch sensor is much easier than writing a password, and fingerprints also have advantages that it cannot be easily guessed or stolen we are going to develop a methodology for authenticate the user using a mobile application.is developed. This application using a Realtime database that stores the fingerprints and a numerical value to check the authenticity of the user. Use the information in the user's fingerprint and these numerical values provides the enhanced security to the login of the application.

References

Tao Feng, Xi Zhao, Nick DeSalvo, Zhimin Gao, Xi Wang, and Weidong Shi,” Security after Login: Identity Change Detection on Smartphones Using Sensor Fusion” in 2015 IEEE

Timothy Dee, Ian Richardson Akhilesh Tyagi, “Continuous Transparent Mobile Device Touchscreen Soft Keyboard BiometricAuthentication” in 2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID)

Asadullah Laghari, Waheed-ur-Rehman, Dr. Zulfiqar Ali Memon, “Biometric Authentication using Smartphone Sensor” Proceeding of 2016 13th International Bhurban Conference on Applied Science and Technology (IBCAST)

Pocovnicu, A., Biometric Security for Cell Phones, Informatica Economici'i, vol 13, no. 1, pp. 57-63,2009.

Kaman, M. and Krishnaraj, N., Bio Password - Keystroke dynamic Approach to Secure Mobile Devices, Computational intelligence and Computing Research (ICCIC), 2010 iEEE international Conference on, Coimbatore, 2010.

Apple, Accessing Keychains Items with FaceID or TouchID, Apple 2018, Available: https://developer.apple.com/documentation/localauthentication/accessing_keychain_items_with_face_id_or_touch_id?language=objc#see-also

R. Scheel and A. Tyagi. Characterizing composite user-device touchscreen ACM International Workshop in 2015.

Kaushik, Vipul & Gupta, Kamali & Deepali, Gupta. (2019). React Native Application Development..

anielsson, W., Froberg, A., & Berglund, E. (2016). React Native Application Development-A comparison between native Android and React Native,(pp. 1-70), http://www.divaportal.org/smash/get/diva2:998793/FULLTEXT02.

Beyshir, A. (2016). Cross-platform development with React Native.(pp. 1-32), https://uu.diva-portal.org/smash/get/diva2:971240/FULLTEXT01.pdf

Published

2021-12-21

How to Cite

Agrawal, R., & Moud, D. . (2021). User Authentication Using React Native Application. JOURNAL OF OPERATING SYSTEMS DEVELOPMENT &Amp; TRENDS, 8(2), 19–25. Retrieved from https://stmcomputers.stmjournals.com/index.php/JoOSDT/article/view/105