Keywords Authentication, Biometric, GAIT, Graphical Password, Multi-Factor Authentication, Usability- Deployability-Security Framework, ZEBRA.
|
|
|
- Buddy Blake
- 10 years ago
- Views:
Transcription
1 Volume 5, Issue 3, March 2015 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Comparative Analysis of Various Factors of Surbhi Chug *, Sunny Dagar Computer Science and Engineering Manav Rachna College of Engineering India Abstract In the continuous changing world of global data communications, reasonable Internet connections, and rapid software development, security has become a critical issue. Security is the basic requirement for global computing as it is inherently insecure. Unauthorized access to the system may be obtained by attackers or intruders, who are commonly known as "crackers", who then use the advanced knowledge to impersonate the actual user, steal information, or even deny the access to resources and computer system. Firstly, remember that no computer system is completely secure. Therefore, all that can done is to make increasingly difficult for the intruder to compromise with the system. Therefore, it is necessary to prove your identity. The process of determining and proving the identity of the user is known as authentication. This paper describes various factors of authentication and their comparisons. Keywords, Biometric, GAIT, Graphical, Multi-Factor, Usability- Deployability-Security Framework,. I. INTRODUCTION The secure system considers security, reliability, usability, and human factors. The process of determining the identity of the user is called authentication. It is required as a prerequisite to allow accessing the computer system and its resources. A person may get access of a system by passing the authentication mechanism. But what if an unintended person gets the credentials of an intended user and authenticate himself on behalf of actual user. So a scheme is required in which a user has to pass two or more levels of authentication in order to get access of the system. So authenticating a user in more than one ways is known as multifactor authentication. is done by using something you know (such as your password), something you have (such as your smartphone, tokens), or something unique to you (such as a retinal scan or fingerprint). Most early authentication is solely based on password but they are easily cracked, therefore to provide more security more than one factor authentication is required. A single factor of authentication does not provide security. For example:- Based. Typically passwords are strings of letters and digits, i.e. they are alphanumeric. Such passwords have the disadvantage of being hard to remember. Weak passwords are vulnerable to dictionary attacks and brute force attacks where as Strong passwords are harder to remember. Therefore, to provide more security more than one factor authentication is required. Multi-factor authentication is one of the strongest ways to protect access to your accounts and information. Multifactor authentication means combining two or more factors of authentication. It is both secure and stable. II. RELATED WORK In 2004, Yoon et al. proposed a mutual authentication scheme based on generalized EIGamal signature scheme using smart cards. The Yoon-Ryu-Yoo s scheme can be divided into three phase: registration, login and authentication. In addition, user can change their passwords freely and securely without the help of remote system. The drawback of their authentication is that the intruder is able to reveal previous session keys by means of the disclosed secret parameters. Then in 2005, Bin Wang and Zheng-Quan Li [1] proposed a new scheme which offer forward secrecy. Text-based username and password is vulnerable to guessing, dictionary attack, key-loggers, shoulder-surfing and social engineering. In 2011, Li Yang, Jian-Feng Ma, Qi Jiang [5] proposed a mutual authentication scheme based on smart cards and password under trusted computing, in which hash functions are used to authenticate identities, and remote attestation is used to verify the platform. Analysis showed this scheme can resist most of the possible attacks. Is secure and efficient and fulfills the designed security goals, such as secure session key agreement, user identity anonymity, password free changing, platform certification updating. Smart card scheme still suffers from the smart card loss problem and fails to provide user untraceability and also vulnerable to desynchronization attack. Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang [4] proposed a robust two-factor authentication and key agreement scheme with user privacy preservation achieving all the goals of security. Ayu Tiwari, SudipSanyal, Ajith Abraham, Svein Johan Knapskog, SugataSanyal [3] proposed the secure and stable protocol using multifactor authentication. They used a unique approach based on TIC (Transaction Identification Code) and SMS (Short Message Service) to provide extra security level with traditional Login/ based system. Al- 2015, IJARCSSE All Rights Reserved Page 416
2 Qayedi et al. have proposed the use of SMS but have not used TIC s in their protocol TIC s are user specific unique transaction identification codes which are issued by banks or financial institutions to the user. This code is similar to One Time (OTP) and code is used only once. They suggested to use TIC s as secret codes on cell phones. The user if authenticated only when he enters the TIC s code which he receives. Therefore, this scheme is more secure and stable than other schemes. Alireza Pirayesh Sabzevar,Angelos Stavrou [2] proposed a series of methods to authenticate the user with a graphical password. To that end, they employ the user s personal handheld device as the password decoder and the second factor of authentication. In their methods, a service provider challenges the user with an image password. To determine the appropriate click points and their orders, the user needs some hint information only to its handheld device. They have proposed the system that leverages both graphical passwords and multifactor authentication. They have employed graphical password combined with a handheld device to form a novel method of multifactor authentication. J.K. Lee, S.R. Ryu and K.Y. Yoo proposed fingerprint-based remote user authentication scheme [11]. They proposed that the fingerprint verification method is based on minutia extraction and matching. Whenever a fingerprint is input, a different map of minutia is made and matched. This scheme requires a system to authenticate each user by each user s knowledge, possession and biometrics and this makes the authentication mechanism more reliable. The biometrics uses physiological or behavioural characteristics like fingerprint or facial scans and iris or voice recognition to identify users. The biometrics includes the following: - voice recognition, fingerprints, face recognition, iris scan, retinal scan, hand and finger geometry, signature, gait, and keystroke dynamics. Gait authentication has gained a lot of interest in recent years. It is basically developed for mobile phones for quick, easier and secure authentication. Gait recognition systems can be categorized into three classes: machine vision based (MV-based), Floorsensor based (FS-based) and Wearable sensor based (WSbased) [12]. Gait recognition is based on person s movements like walking, moving hands. In May, 2014 Shrirang Mare, Andr es Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz described and evaluated Zero-Effort Bilateral Recurring called [7]. is a token-based authentication scheme that authenticates users based on their interactions with the device. Unlike keystroke-based biometrics that authenticates users based how they type, authenticates users based on what interactions (e.g., typing, scrolling) they perform on the device and when. In users wear a wrist-bracelet (token) that has built-in accelerometer and gyroscope sensors and a short range wireless radio to communicate with the device. authenticates users by monitoring their hand movements, using the sensors in the wrist-bracelet, when they are interacting with the device, and comparing the hand movements with the inputs received by the device during the interaction. In the bracelet contains the identification information for its associated user, which it shares with the device to authenticate the user. The user can associate the bracelet with herself when she wears the bracelet, say by entering a PIN on the bracelet or through a secure channel to the bracelet. The bracelet clasp can detect when it is being taken off and it de-associates with the user when it is taken off. III. COMPARISON FRAMEWORK We have compared various authentication schemes using the usability-deployability-security (UDS) evaluation framework [6]. The UDS framework defines a set of benefits to evaluate web authentication schemes, but many of those benefits are relevant to device authentication schemes. A. The UDS framework defines total 25 benefits to evaluate web authentication schemes: 8 usability benefits, 6 deployability benefits, and 11 security benefits. We use total 14 benefits to evaluate and compare various authentication schemes: 12 benefits from the UDS framework and 3 additional benefits that are applicable to continuous authentication schemes. As in the UDS framework, we rate each scheme as either offering or not offering the benefit of a property, if the scheme almost offers the benefit, but not completely, it is indicated with the Quasi- prefix. 1. USABILITY U1 Memory-wise-Effortless : Users of the scheme do not have to remember any secrets or confidential information at all. U2 Nothing-to-Carry : Users do not need to carry any physical device or object to use the scheme. We grant a Quasi-Nothing-to-Carry if the scheme can be implemented on an object that users carry or wear everywhere all the time anyway, such as their mobile phone, wrist watch, wearable fitness devices. U3 Easy-Recovery-from-Loss : The user can comfortably regain the ability to authenticate if the authentication credentials are forgotten or the token is lost. We grant a scheme Quasi-Easy Recovery-from-Loss benefit if the user has to purchase a token, but can reset the authentication credentials herself without having to involve the other party. A user s authentication credential is the information that the user presents to the device to get authenticated, e.g., username and password, fingerprint. U4 Physically-Effortless : The process of authentication does not require any physical user effort beyond what the user performs while interacting with the device to get his/her task done on the device. In other words, the scheme should be passive, i.e., it should not require any explicit input from the user, but the scheme can use the inputs the user anyway provides to the device to get his/her task done. We grant schemes Quasi-Physically-Effortless benefit if they require the user to perform an action which is easy and effortless to perform once. 2015, IJARCSSE All Rights Reserved Page 417
3 U5 No-Constraint-on-Using-the-Device : The scheme should not add any constraint on how the user should use the device or interact with the device. We grant Quasi-No-Constraint-on-Using-the-Device benefit to schemes that add constraints that are easy to follow but do not require any additional physical effort from the user. For example, the facialrecognition scheme requires the user to be in the camera s field of vision, which can be easy, buta voice-based scheme requires the user to provide audio input, which is easy but requires physical effort. 2. DEPLOYABILITY D1 Accessible : The users can use passwords that are not prevented from using the scheme by disabilities or other physical (not cognitive) conditions. D2 Negligible-Cost-per-User : The total cost the user requires to access the scheme, includes the costs at the prover s end (any device/token required for the user to authenticate) and the cost at the verifier s end (any hardware and/or software required on the device to authenticate the user). Quasi-Negligible-Cost-per-User is awarded to the scheme if the required cost on prover s end can be masked with the devices users carry anyway and the verifying device already contains the required hardware. 3. SECURITY Security benefits S1-S5 are from the UDS framework. We introduce two additional security benefits, S7 and S8, for continuous authentication schemes. S1 Resilient-to-Physical-Observation : The intruder is not able to impersonate a user after observing them authenticate one or more times. Attacks include shoulder surfing, filming the keyboard or mouse use [10], recording keystroke timings based on sensors near the keyboard [8], or thermal imaging the keypad[9]. S2 Resilient-to-Internal-Observation : The intruder cannot impersonate a user by intercepting the user s inputs from inside the user s device (e.g., by keylogging malware) or eavesdropping on the cleartext communication between the user s token (prover) and the authenticating device (verifier). S3 Resilient-to-Leaks-from-Other-Verifiers : Anything that a verifier could possibly leak could not help the intruder impersonate the user to another device. S4 Resilient-to-Phishing : The intruder who simulates the authentication process, e.g., by spoofing the authentication screen, is not able to collect credentials that can be used later to impersonate the user on the actual device. S5 Resilient-to-Theft : If the credentials are lost they are not used for authentication by any another person who gains knowledge and possession of it. The lost credentials can be passwords written down by paper or hardware tokens. This benefit penalizes single-factor schemes (For Example, text-passwords) that do not offer any protection against theft. In the UDS framework this benefit is considered only for schemes in which physical objects or devices are used for authentication. In addition, theft of even non-physical credentials such as passwords is also considered, which can be stolen when people write them down. As in the UDS framework, Quasi-Resilient-to-Theft is granted if the scheme protects the credential with the modest strength of a PIN. S7 Verify-Actual-User : The scheme can verify whether the user is actually using the device at any point in time. This benefit penalizes schemes such as one-time authentication schemes, which do not verify the user after the user authenticates once. Quasi-Verify-Actual-User benefit is granted to schemes that do weak verifications, such as verifying whether the user is in front of the device (face-based schemes) or whether the user is speaking to the device (voicebased). S8 Continuous- : The scheme should continuously authenticate the user while the user uses the device. IV. COMPARATIVE EVALUATION Now we will compare various factors of authentication, according to the above framework : Table I: Comparative evaluation of various authentication schemes on basis of usability benefits Memory Nothing-to- Easy-Recoveryfrom-Loss Physicallywise- Carry Effortless Effortless USABILITY s One Time Graphical Finger-print Based GAIT No-Constraint-on- Using-the-Device 2015, IJARCSSE All Rights Reserved Page 418
4 Table II: Comparative evaluation of various authentication schemes on basis of deployability benefits. DEPLOYABILITY Accessible Negligible-Cost-per-User s One Time Graphical Finger-print Based GAIT Table III: Comparative evaluation of various authentication schemes on basis of security benefits. Resilient-to- Resilient-to- Resilient Verify- Physical- Internal- -to-theft Actual-User Observation Observation SECURITY s One Time Graphical Finger-print Based GAIT Resilient-to- Leaks-from- Other- Verifiers Offers Benefit Does Not Offer Benefit Almost Offers Benefit Somewhat Offers Benefit Average Offers the Benefit Continuous- V. CONCLUSION In this paper, we represent the UDS framework which provides the way to compare various factors of authentication. As per our evaluation, single factor of authentication does not provide as much security. But if we combine two or more factors then security is ensured. Moreover, passwords and graphical passwords based scheme are more deployable than other authentication schemes. but graphical passwords provide more security than the text passwords. However, rates the highest and is secure, usable and deployable as compared to other schemes. REFERENCES [1] Bin Wang and Zheng-Quan Li, A Forward-Secure User Scheme With smart Cards, 11, Oct [2] Alireza Pirayesh Sabzevar, Angelos Stavrou, Universal Multi-Factor Using Graphical s. SITIS, 2008, 2013 International Conference on Signal-Image Technology & Internet-Based Systems, 2013 International Conference on Signal-Image Technology & Internet-Based Systems 2008, pp , doi: /sitis [3] Ayu Tiwari, Sudip Sanyal, Ajith Abraham, Svein Johan Knapskog, Sugata Sanyal, A Multi-Factor Security Protocol For Wireless Payment- Secure Web Using Mobile Devices. IADIS International Conference on Applied Computing Proceedings of the IADIS International Conference on Applied Computing, Salamanca, Spain, February 2007,Submitted on 13 Nov [4] Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang, Robust Two-Factor and Key Agreement Preserving User Privacy. JOURNAL = "I. J. Network Security",PAGES = , [5] Li Yang, Jian-Feng Ma, Qi Jiang, Mutual Scheme with and under Trusted Computing. Journal - IJ Network Security - Volume 14 Issue 3 Pages , [6] J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano. The Quest to Replace s: A Framework for Comparative Evaluation of Web Schemes. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), pages , May DOI /SP , IJARCSSE All Rights Reserved Page 419
5 [7] Shrirang Mare, Andr es Molina-Markham, Cory Cornelius2, Ronald Peterson, and David Kotz. : Zero- Effort Bilateral Recurring (Companion Report), Proceedings of the IEEE Symposium on Security and Privacy, May [8] P. Marquardt, A. Verma, H. Carter, and P. Traynor. (sp)iphone: Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), pages ACM, Oct DOI / [9] K. Mowery, S. Meiklejohn, and S. Savage. Heat of the moment: Characterizing the Efficacy of Thermal Camera Based Attacks. In Proceedings of the USENIX Workshop on Offensive Technologies (WOOT), Online at files/mowery.pdf. [10] R. Raguram, A. M. White, D. Goswami, F. Monrose, and J.-M. Frahm. ispy: Automatic Reconstruction of Typed Input from Compromising Reflections. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), CCS 11, pages ACM, DOI / [11] J.K. Lee, S.R. Ryu and K.Y. Yoo, Fingerprint-Based Remote User Scheme Using Smart Card, Electronics Letter, 6 th June 2002, Vol 38 No. 12. [12] LI Yuexiang, WANG Xiaobo and QIAO Feng, Gait Based on Accelerating Signals of Ankle, Chinese Journal of Electronics Vol.20, No.3, July , IJARCSSE All Rights Reserved Page 420
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Universal Multi-Factor Authentication Using Graphical Passwords
Universal Multi-Factor Authentication Using Graphical Passwords Alireza Pirayesh Sabzevar, Angelos Stavrou Computer Science Department, George Mason University, Fairfax, Virginia, 22030 {apirayes, astavrou}@gmu.edu
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Journal of Internet Banking and Commerce
Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, April 2012, vol. 17, no. 1 (http://www.arraydev.com/commerce/jibc/)
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA)
Issues and Challenges in Ensuring Trust, Security, Performance and Scalability in a Common Multi-Banking Solution Sree Rekha.G Research Assistant, CORI, PESIT, Bangalore. V.K.Agrawal, Director, CORI, PESIT,
Assignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Multi-Factor Authentication
Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY
HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY INSTEAD OF A SECURITY PROBLEM, ENDPOINTS BECOME PART OF THE SECURITY SOLUTION SUMMARY The internet and mobility have made enterprise
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
A Method of Risk Assessment for Multi-Factor Authentication
Journal of Information Processing Systems, Vol.7, No.1, March 2011 DOI : 10.3745/JIPS.2011.7.1.187 A Method of Risk Assessment for Multi-Factor Authentication Jae-Jung Kim* and Seng-Phil Hong** Abstract
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
A puzzle based authentication method with server monitoring
A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Contributions to Web Authentication for Untrusted Computers
Linköping Studies in Science and Technology Thesis No. 1481 Contributions to Web Authentication for Untrusted Computers by Anna Vapen Submitted to Linköping Institute of Technology at Linköping University
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Progressive Authentication on Mobile Devices. They are typically restricted to a single security signal in the form of a PIN, password, or unlock
Progressive Authentication on Mobile Devices Zachary Fritchen Introduction Standard authentication schemes on mobile phones are at the moment very limited. They are typically restricted to a single security
International Journal of Emerging Technology & Research (www.ijetr.org) ISSN (E): 2347
Volume 1, Issue 7, Nov - Dec, 2014 International Journal of Emerging Technology & Research (www.ijetr.org) ISSN (E): 2347 Network Security Using Multiserver Authentication Mr. Yogesh R. Bhuyar 1, Dr G.
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing Ajinkya S. Yadav M.E.student, Department of Computer Engineering. Pune University, Pune A. K.Gupta Professor, Department of Computer
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Guidance on Multi-factor Authentication
Guidance on Multi-factor Authentication June 2006 Guidance on Multi-factor Authentication Guidance on Multi-factor Authentication State Services Commission June 2006 Version 1.0 ISBN 0-478-24466-5 Crown
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key
International Journal of Network Security, Vol.18, No.6, PP.1060-1070, Nov. 2016 1060 A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key Trung Thanh Ngo and Tae-Young
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY Implementation of Multi-Factor Authentication Scheme Vasundhara Bhele Prof. Nilesh Chaubey Prof. Shyam Dubey Computer Science &
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
White Paper. The Principles of Tokenless Two-Factor Authentication
White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION
A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION Kalpesh Adhatrao 1, Aditya Gaykar 2, Rohit Jha 3, Vipul Honrao 4 Department of Computer Engineering, Fr. C.R.I.T., Vashi,
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme
On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme Manoj Kumar Department of Mathematics R. K. College Shamli-Muzaffarnagar,.P.-India - 247776 E-mail: yamu [email protected]
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
Authentication in an Internet Banking Environment
Federal Financial Institutions Examination Council FFIEC Logo 3501 Fairfax Drive Room 3086 Arlington, VA 22226-3550 (703) 516-5588 FAX (703) 516-5487 http://www.ffiec.gov Authentication in an Internet
Scalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Two-Factor Authentication Making Sense of all the Options
Two-Factor Authentication Making Sense of all the Options The electronic age we live in is under attack by information outlaws who love profiting from the good record of others. Now more than ever, organizations
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Modern two-factor authentication: Easy. Affordable. Secure.
Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd
Stop Identity Theft with Transparent Two-Factor Authentication e-lock Corporation Sdn Bhd December 2009 Table Of Content Table Of Content... 2 Executive Summary... 3 1. Introduction... 4 1.1 The Issue
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC
International Journal of Network Security, Vol.18, No.2, PP.217-223, Mar. 2016 217 A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC Dianli Guo and Fengtong
Multi-Factor Authentication Core User Policy and Procedures
Multi-Factor Authentication Core User Policy and Procedures Core Users with access to other people s sensitive or restrictive information must use one-time passwords (OTP) generated from approved fobs
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
SESAME: Smartphone Enabled Secure Access to Multiple Entities
SESAME: Smartphone Enabled Secure Access to Multiple Entities Ameya Sanzgiri Anandatirtha Nandugudi Shambhu Upadhyaya Chunming Qiao Computer Science and Engineering, University at Buffalo, Buffalo, NY
Implementing High Grade Security in Cloud Application using Multifactor Authentication and Cryptography
Implementing High Grade Security in Cloud Application using Multifactor Authentication and Cryptography Niharika Gupta 1 and Rama Rani 2 1Research Scholar, Department of Computer Science & Engineering,
International Journal of Intellectual Advancements and Research in Engineering Computations
www.ijiarec.com MAY-2015 International Journal of Intellectual Advancements and Research in Engineering Computations CLOUD BASED MULTIFACTOR AUTHENTICATION FOR PERSONAL HEALTH RECORD ABSTRACT ISSN: 2348-2079
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
