International Journal of Emerging Technology & Research ( ISSN (E): 2347
|
|
|
- Amber O’Connor’
- 10 years ago
- Views:
Transcription
1 Volume 1, Issue 7, Nov - Dec, 2014 International Journal of Emerging Technology & Research ( ISSN (E): 2347 Network Security Using Multiserver Authentication Mr. Yogesh R. Bhuyar 1, Dr G. R. Bamnote 2 1 Research student, Computer science &Engineering P.R.M.I.T&R.(Badnera), Maharashtra, India 2 H.O.D. Computer Science Deparment, P.R.M.I.T&R.(Badnera), Maharashtra, India ISSN (E): ISSN (P): Abstract- In this paper, we propose multi server authentication system with user protection in network security. We first propose a single-server server system and then apply this technique to a multi-server system. Addition to user authentication and key distribution, it is very useful for providing privacy for users. The key factors include. The privacy of users can be secured. A user can freely choose his own password. The computation and communication munication cost is very low. Servers and users can authenticate each other. Index Terms Network security, privacy protection, session key, smart card, user authentication. cryptosystems. For basically security and efficient requirements, the following criteria are important for remote user authentication and key agreement schemes with smart cards II. PROTECTION CRITERIA A. Privacy protection: When the user authenticates successfully to the server, the adversary cannot derive the user s identity. I. INTRODUCTION In order to use services by service providers in a network environment, the user must login to the provider s server. In general, the user gives a message of user authentication to the server, and then the server must be able to check the identity of the user and give him the right of using permitted services. Typically, ly, the user passes a password as a secret token to the server. The server first verify if the user s identity and the password are matching. The server rejects the user s request if his Identity or the password is not matching. If the password is matching, the server gives the user the right for using the permitted services. Password authentication scheme at both the point of the communication. cation. Since then, many technic have been proposed posed to point out its drawback and improve the security and efficiency of Lamport s scheme.[3] Only passing a password for authenticating between the user and the server is not sufficient, since it contain less amount safety and is easily hack by the intruders. Before two parties can do secure communication, a session key is required for protecting subsequence communications. Also, using smart cards, remote user authentication and key agreement can be simplified, flexible and efficient for creating a secure distributed computers environment. It is also useful for providing identity privacy for the users. [5] In two efficient authentication and key agreement schemes for single server, and multi server environments. But both Juang s schemes have no ability of anonymity for the user. Yang et. al. Proposed user identification and key distribution scheme with the ability of privacy protection but we point out it is less efficient because of using public-key B. Freely chosen password: Users can freely chosen and change his/her passwords for protecting their smart cards. C. Low communication cost: Since capacity and communication limitations of smart cards, they may not offer a powerful computation capability and high bandwidth. D. Authentication : Authentication is a direct need of each and every organization and so it is becoming important for an organization not because it copes with security threats only but for the reason it deals with and develops policies, procedures and mechanisms that provide administrative, physical and logical security. Whenever an user requests an access to a pool of resources, to use them or update them as desired, then to authenticate such an individual is referred to as authentication [2]. Computer industry has created an array of identification and authentication technologies like userid/passwords, One Time Password, Biometrics, Smartcards, Kerberos, Secure Socket Layer, Lightweight Directory Access Protocol, Security Assertion Markup Language(SAML), OpenID and CardSpace to address varying business and security requirements [11]. Each organization adopts one or more of these technologies to secure information against intruders and un-authorized access. In networked environment, users are granted access to the network only when they provide their access information (e.g. user name & password) securely to check and validate their identity. If a person can prove that who he is, also knows something that only he could knows, it Copyright reserved by IJETR (Impact Factor: 0.997) 99
2 1.1 Factors and identity The ways in which someone may be authenticated fall into three categories, based on what are known as the factors of authentication: something the user knows, something the user has, and something the user is. Each authentication factor covers a range of factors used to authenticate or verify a person's identity prior to being granted access, approving a transaction request, signing a document or other work product, granting authority to others, and establishing a chain of authority security research has determined that for a positive authentication, elements from at least two, and preferably all three, factors should be verified. The three factors (classes) and some of elements of each factor are The knowledge factors: Something the user knows (e.g., a password, pass phrase, or personal identification number(pin), challenge response (the user must answer a question), pattern. The ownership factors: Something the user has (e.g., wrist band, ID card, security token, cell phone with built-in hardware, software token, or cell phone holding a software token) III. VARIOUS FACTORS OF AUTHENTICATION: Authentication systems can be categorized according to the number of identification factors required to ascertain identity Req. Rejct. Req.Rect. Req.Rejct User login/sign up 1 st Auth(PW) 2 ND Auth token 3 RD Auth BIOMAT Secure login Chq Log TM DB1 Check threshold value(ttl) Chq HBP DB2 DB3 A] SINGLE-FACTOR AUTHENTICATION (SFA): user Logout login Fig -1: Data flow Diag. of Multiserver Authentication Check authentic ation data DB Single-factor authentication is the traditional security process that requires a user name and password before granting access to the user.sfa security based on the diligence of the user, user should take additional precautions.for example, creating a strong password and ensuring that no one can access it. For applications that require greater security, it may be advisable to implement more complex systems, such as multifactor authentication IV. TWO-FACTOR AUTHENTICATION (TFA): A. It requires two components, usually a combination of something the user knows (Such as a password) and something the user possesses (such as a physical token Secure ID card). In this case the user login to a network and Ticket is given to the user.the ticket contain client ip, server ip,client id,login and TTL (Time to leave). TFA check the current time and the login time if the login time is less than TTL.So user login else if the current time is more than TTL which result in logout the session. V. THREE-FACTOR AUTHENTICATION (TFA): Adds a biometric heart beat, a measurement of a human body characteristic. The more authentication factors used, the more secure the process. Security with the heart beat while sign up the heart beat of the user is then saved in data Copyright reserved by IJETR (Impact Factor: 0.997) 100
3 base.so while login we record the heart beat of the user in the database it then check the heart beat pattern in the database.if the pattern is having varience is less than the TTL then the user is login else logout. However, the more factors you add, the more you add complexity, cost, and management overhead. Every factor will offer a different break-even point in the tradeoff between simplicity and security. Single-factor authentication with user ID and password is the most common authentication system today. It s very familiar to users, and can provide a high level of security if strong password is provided. Legacy password systems have had some challenges, however, since multiple strong passwords are very hard for users to remember. The recommendations in this section will show how this problem can be minimized with a Single Strong Password system. Tokens such as system ip, client ip and login time are added as a second factor in many authentication systems requiring that the user have physical possession of the token. An attacker would similarly have to have possession of the user s token in order to gain system access.[10] The higher level of authentication comes with additional system cost, however, due to the necessary tokens and token readers. In addition, tokens can be easily lost or destroyed, which can present a high administration overhead for reissuing. Biometric factors for authentication measure characteristics of the user s body such as fingerprint, handprint, retina, iris, or voice characteristics. Biometric measurements are a useful additional factor and add an even higher level of authentication security. A biometric authentication system entails a measurement proving who the person actually is, rather than proving they have something such as a token or proving that they know something such as a password. Unfortunately, biometric measurements are not 100 percent effective; with the present state of the technology,but it provid high level of security it is possible to register false positives and false negatives. Biometric authentication systems also require biometric readers at system access points, adding new system costs. Strong cryptographicallybased authentication can be provided through the use of digital certificates issued to users and stored on tokens or within the user s computer memory. Cryptographic SHAL secure hashing algorithms are used to ensure that a particular certificate has been actually issued to the user. A system ip Infrastructure is used to enable the issuance and maintenance of digital certificates.[7] Strong cryptographically-based systems provide very stringent authentication. However, these systems are expensive and incur additional management overhead. Therefore, they are currently being adopted only in very secure environments. VI. KNOWLEDGE FACTORS Knowledge factors ("something only the user knows") are the most commonly used form of authentication. In this form, the user is required to prove knowledge of a secret in order to authenticate A password is a secret word or string of characters that is used for user authentication. This is the most commonly used mechanism of authentication. Many multi-factor authentication techniques rely on password as one factor of authentication A personal identification number (PIN) is a secret numeric password and is typically used in ATMs. Credit and ATM cards do not contain the PIN or CVV on the magnetic stripe.[4] This aligns with the principle that the PIN is not part of "something the user has" for this use. A pattern factor is a regular or stochastic sequence or array of sets of information, used for authenticating the users. For example, pattern factor based authentication may be presented by the bearer to a sensor unit to get authenticated by a processing unit Examples of pattern factors are listed below in a onedimensional bar code or in a two-dimensional matrix code or in a fingerprint- heart beat like set in any n-dimensional stack in any physical representation, as with, for example: electronic mechanical, optical, or any other automatically detectable and process able coding Secret questions such as "Where were you born?", which an authenticating entity arranges ahead of time with the user, are also a knowledge factor. VII. Possession factors: A.The security tokens contain client ip, client id, server ip login time and TTL(time to leave) if the current ip address of the client matches with the ip address in the ticket then the user is not under attack.but if the current ip and the ip present in the ticket do not match then the user is under attack.so user logout the session. B. Possession factors ("something only the user has") have been used for authentication for decades, in the form of a key to a locker. The basic principle is that the key embodies a secret which is shared between the lock and the key, and the same principle underlies possession factor authentication in computer systems. C. There are several ways of attacking such a system, including: An attacker can determine the shared secret, for example by attacking the authenticator or a management system,[5] reverse-engineering the possession factor, or intercepting the secret during authentication. In the case of a lock and key, the lock can be picked.[6] In an inadequately secured computer system, for example, a database containing the shared secrets can be attacked through SQL injection. An attacker can steal the possession factor. In the case of a lock and key, the attacker can steal the key and use it before the rightful owner notices the loss and has the lock changed. Copyright reserved by IJETR (Impact Factor: 0.997) 101
4 Fig -2: Authentication reference model VIII. Disconnected tokens: The generates during the second factor are unique for an individual at a specific time if the current time and the login time should not have more difference if the login time is less than TTL then the user can login the process but if the login time is more than the current time than if disconnect the tokens and close the session. In a "sequence-based" token, the token may have a button that is pressed to switch it on and display a new pass code. The cumulative number of button pushes can be used as the challenge. The server, however, must assume that the button may have been pressed a number of times since the last actual use, and attempt the authentication with all likely numbers of button pushes. In a "time-based" token, the token generally contains a specific time source, allowing the absolute time to be used as the challenge and a new pass code to be displayed (usually) every 30 or 60 seconds. In this case, the authentication server must allow for a drift in the time source by trying the authentication with a previous and subsequent time as well as the current time. It can hence keep track of the drift in the clock. Display tokens have the advantage that no drivers or electronic interfaces are required on the user access device. Often, it is possible to arrange for the pass code from the display to be appended to a password in an existing password field, so that the only modifications required are in the authentication server. A disadvantage in some sectors is that the display is usually small, and may be difficult to read for visually impaired users. XI. Biometric Factor In the present times, security has becomes a critical issue in automated authentication systems, Biometrics is a science of identifying a person using his/her physiological and behavioral characteristics, Biometrics traits are difficult to counterfeit and hence results in higher accuracy when compared to other methods such as using passwords and ID cards, Human physiological or behavioral can be used as biometric characteristic when it satisfies the requirements like universality, distinctiveness, permanence, and collectability. One need focus on some major issues performance, acceptability, and circumvention, Keeping all these requirements in mind, biometric like fingerprints, hand geometry, hand written signatures, retinal patterns, facial images, ear pattern, voice. Are used extensively in the areas that require security access. Most of the biometric traits mentioned above have certain disadvantages that threaten the level of security. Some of the traits can easily to forged to create false identities. And few other traits can be used even in the absence of the person and even he is dead. Hand vein pattern is one trait that cannot be used in the person unlike the other traits like finger print, palm print, etc. This is a more secure approach, but it suffers from disadvantages like alteration due to hand injury, Even though this can be overcome, 100% accuracy cannot be achieved due to limitations on the threshold. Such problem can be solved using heartbeat as the biometric trait. And it cannot be copied to fake identity, and it cannot be altered to hide identity, The heartbeat of a person is captured in the form of an electrocardiogram recording. The ECG of a person varies from person to person due to change in size, position, and anatomy of the heart, chest configuration, and various factors. As a biometric trait, electrocardiographic (ECG) signals have very appealing characteristics as they provide intrinsic liveliness detection and are strongly correlated to the subjects arousal level [1]. Therefore, the application of ECG for biometric purposes has been studied for long, both under controlled and unrestrained scenarios [2]. Recent work has shown the validity of the ECG signals for human identification [6]. While results enhance the potential of these signals, user acceptance may be limited by the data acquisition methods and apparatus. State-of-the-art research has revealed that, for biometric applications, a 1-lead setup suffices; nonetheless, a chest-mounted sensor apparatus with propelled electrodes is typically used [9]. Given this constraint, work in the field has begun to focus on ECG acquired at the finger tips. In a nonmedical data, acquisition setup is explored, which uses two electrodes connected at the subjects thumb tips; data acquisitions and performance evaluation were done for data collected within a group of 50 subjects. The authors process the collected signals for P- QRS-T segmentation and align the resulting waves to extract a mean wave. Classification results are obtained through the use of a distance metric based on wavelet coefficients, computed by doing a wavelet representation of Copyright reserved by IJETR (Impact Factor: 0.997) 102
5 the extracted mean waves. We propose an ECG-based biometric system for human identification that recurs to a minimally intrusive 1-lead setup for signal acquisition at the fingers. Our apparatus uses Ag/AgCl electrodes without gel as interface with the skin, further improving its usability. X. CONCLUSION In this paper, we have proposed two user authentication and Biometric schemes with privacy protection for single server and multi-server environments. Regarding the single server scheme in network security, it is more simple and efficient. Regarding the multi-server scheme, users only need to register one time and can use all provided services by service providers. Both our proposed schemes have the ability of privacy protection. Our systems also have low communication and using one-way functions. Also, our schemes successfully solve the serious time-synchronization problem in a distributed computers environment since our proposed schemes are nonce-based. REFERENCES [1] [1]. M. Alzomai, '' Identity Management : Strengthening One Time Password Authentication Through Usability ''. PhD thesis May [2] [2]. H.C. Kim, H.W. Lee, K.S.Lee, M.S. Jun, '' Design of One-Time Password Mechanism using Public Key Infrastructure '' / IEEE DOI /NCM [3] [3]. J.L. Tsai, Efficient multi-server authentication scheme based on one-way hash function without verification table, Computers & Security, Vol. 27, No. 3-4, pp , May-June [4] [4]. Y.P. Liao, S.S. Wang, A secure dynamic ID based remote user authentication scheme for multi-server environment, Computer Standards & Interfaces, Vol. 31, [5] [5]. S. Bellovin and M. Merritt, Encrypted key exchange: Passwordbased protocols secure against dictionary attacks, in Proceedings of IEEE Symposium on Research in Security and Privacy, pp , [6] [6]. M. Burrows, M. Abadi, and R. Needham, A Logic of Authentication, ACM Transactions on Computer Systems, vol. 8, no. 1, pp , [7] [7]. Y. Chang and C. Chang, Authentication schemes with no verification table, Applied Mathematics and Computation, vol. 167, pp , Copyright reserved by IJETR (Impact Factor: 0.997) 103
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company
3M Cogent, Inc. White Paper Beyond Wiegand: Access Control in the 21st Century a 3M Company Unprecedented security features & capabilities Why Wiegand? The Problem with Wiegand In 1970, John Wiegand invented
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Security Model in E-government with Biometric based on PKI
Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
, pp. 239-246 http://dx.doi.org/10.14257/ijsia.2015.9.4.22 Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security R.Divya #1 and V.Vijayalakshmi #2 #1 Research Scholar,
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).
Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
BIOMETRIC AUTHENTICATION SECURITY AND USABILITY
BIOMETRIC AUTHENTICATION SECURITY AND USABILITY Václav Matyáš and Zdeněk Říha Faculty of Informatics, Masaryk University Brno, Czech Republic {matyas, zriha} @fi.muni.cz Abstract We would like to outline
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Assignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
Chapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
Scalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
Two-Factor Authentication Making Sense of all the Options
Two-Factor Authentication Making Sense of all the Options The electronic age we live in is under attack by information outlaws who love profiting from the good record of others. Now more than ever, organizations
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
WHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Continuous Biometric User Authentication in Online Examinations
2010 Seventh International Conference on Information Technology Continuous Biometric User Authentication in Online Examinations Eric Flior, Kazimierz Kowalski Department of Computer Science, California
Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner
Secure Authentication with 3D Password Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner Abstract Providing
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Digital identity: Toward more convenient, more secure online authentication
Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Voucher Web Metering Using Identity Management Systems
Voucher Web Metering Using Identity Management Systems Fahad Alarifi Abstract Web Metering is a method to find out content and services exposure to visitors. This paper proposes a visitor centric voucher
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
Second Level Authentication Using QR Codes
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 2 (2013), pp. 43-50 International Research Publication House http://www.irphouse.com Second Level Authentication
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
Introduction to Computer Security
Introduction to Computer Security Authentication and Access Control Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access: a big picture 1. Identification Which object O requests
www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters
2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
