On Improving Feasibility and Security Measures of Online Authentication
نویسندگان
چکیده
Online service is an important driving force behind many of today’s Web 2.0 applications. For security and privacy concerns, authentication is required for all of services that involve online transactions. Authentication is the process of verifying a user’s identity when the user is requesting services from any secure Information System (IS). By far, the most popular authentication technique is a basic username–password based method that is commonly considered to be a weak technique of authentication. A more secure method is the multi–factor authentication that verifies not only username–password pair, but also requires a second or third unique physical or biological factor. The feasibility of multi–factor authentication is inhibited by its deployment intricacy, and by the cost of building, maintaining, and re-deploying the hardware needed by multi–factor authentication as well. The Internet online transactions require a more feasible and secure means of authentication. Toward the ends, we have developed a technique that is a form of two – factor authentication, called SofToken. The SofToken is very cost effective and can also greatly reduces the deployment complexity of the application, while keeping a comparable or even higher level of security to other currently available techniques. In addition, an enhancement that utilized RFID devices is also proposed to advance the portability of the SofToken application for enterprise intranet-extranet environments. This RFID enhancement on SofToken is designed especially for computer system access using two-factor authentication to improve the security measure.
منابع مشابه
Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Int. J. Adv. Comp. Techn.
دوره 2 شماره
صفحات -
تاریخ انتشار 2010