Authentication Frequency as an Important Design Factor
نویسنده
چکیده
With an ever-increasing number of briefer interactions with a larger number of different “things”, innovative perspectives on authentication could be helpful. Ideally, authentication solutions are designed to balance requirements of security with those of usability, with the latter including cognitive ability for choosing credentials such as passwords, and memorability of those credentials. Some important variables to consider include the size and complexity of the credential alphabet, the length of the credential, and the number of credentials and accounts. Another important variable is the authentication duration: the time spent authenticating by a user over a period of time. The duration could be computed as the duration for each authentication action, multiplied by the number of actions over a particular time period. If the duration can be reduced, then the user would spend less time on the secondary task of authentication. There are at least a couple of approaches to reducing the overall authentication duration for users: reduce the time required for each authentication action, or reduce the total number of authentications performed. At the WAY workshop, I would like to expand on the latter and discuss the importance of authentication frequency to secure and usable authentication design, including some of my related research activities.
منابع مشابه
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملRFID Factor Authentication Application For Trusted Identities in Cyberspace
There are over 2.2 billion Internet users around the world as of December 31 2011, according to the Internet World Stats (IWS) [1]. Online service is an important driving force behind many of today’s Web 2.0 and cloud computing applications. For security and privacy concerns, authentication is utilized by all online services that involve online transactions and restricted information access. Au...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کامل