Shrinking the Authentication Footprint

نویسندگان

  • Karen Renaud
  • Joe Maguire
چکیده

Developers create paths for users to tread. Some users will stay on the beaten track; others will diverge and take risky shortcuts. If user-preferred and developer-created paths diverge too much, it is time for the developer to consider a new path. A case in point is the humble password. They fill an important developer need: a cheap and easy mechanism to control access and enforce accountability. Unfortunately, users find the constant requests for authentication a nuisance. They respond by walking down risky paths that compromise the mechanism but allow them to satisfy goals more quickly. The answer, for some researchers, has been to come up with password alternatives. This focus is misguided, since the alternatives do nothing to reduce the authentication footprint. The reality is that developers overuse authentication. The problem is not the authentication step, but rather its position in the path. Authentication is sometimes used even when there is no real need for it. This creates confusion in the user’s mind about the consequences of authentication: sometimes it authorises significant side effects and other times it is difficult to identify its raison d’etre. Here we suggest some developer patterns which minimise authentication requests, emphasising necessity rather than gratuitousness. We believe this will help to ease the current situation by moving towards genuine risk mitigation rather than harming authentication by excessive use thereof.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFID Security: Attacks, Countermeasures and Challenges

Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience and security. In this paper we analyze some of the most common types of attack on RFID tags: unauthorized ...

متن کامل

LBPV for Newborn Personal Recognition System

An increased anxiety in security in modern ages has primarily resulted in vast attention being given to biometric-based authentication techniques. Biometrics refers to the automatic authentication of human beings based on their physiological and/or behavioral characteristics. This paper proposes a newborn footprint matching system based on the extraction of texture features using LBP. Newborn a...

متن کامل

The Tag Authentication Scheme using Self-Shrinking Generator on RFID System

Since communications between tag and reader in RFID system are by radio, anyone can access the tag and obtain its any information. And a tag always replies with the same ID so that it is hard to distinguish between a real and a fake tag. Thus, there are many security problems in today’s RFID System. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Adversary ...

متن کامل

Biometric Authentication using Human Footprint

The password based authorization scheme for all available security systems can effortlessly be hacked by the hacker or a malicious user. One might not be able to guarantee that the person who is using the password is authentic or not. Only biometric systems are one which make offered automated authentication. There are very exceptional chances of losing the biometric identity, only if the accid...

متن کامل

MiniPASS: Authentication and Digital Signatures in a Constrained Environment

We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartCards and Wireless Applications. The algorithm underlying the PASS scheme, as described in [5, 6], already features high speed and a small footprint, and these are further enhanced by transferring computational overhead to the S...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013