Modified USB Security Token for User Authentication

نویسندگان

  • Wala'a M. AlOmari
  • Hesham Abusaimeh
چکیده

Computer security has been a significant importance in today’s world. Many researches have been done in order to improve the security services with encryption and decryption of sensitive. In addition, Security protocols have been developed to protect accessing the data from the authorized users. One of these protocols is the One-Time Password (OTP) authentication in the USB security tokens. A well-known USB security Token is the Yubikey security tokens. However this token has protocol overhead and time consuming in addition to the speed and memory capacity limitations. In this paper, we have proposed a modification to the Yubikey security protocols in order to enhance the overhead, speed and size limitations in the user authentication process, in addition to increase the security factors that depend on a random number generated from the server and sent to the user via e-mail and SMS to his mobile. Experimental results have been conducted using C# programming language for the user and the server side. All the results show the efficiency improvement of our proposed protocol over the Yubikey security token in the terms of authentication factors, speed and memory size.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SOUL System: secure online USB login system

The SOUL System is a secure online authentication system involving a two-factor authentication scheme that uses a password and an ordinary hardware device as security token. The three main parts of the system include the website, the ordinary hardware device, and a trusted third party. The website must first be integrated with the web API provided and then registered to the trusted third party ...

متن کامل

hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers

We propose hPIN/hTAN, a low-cost token-based e-banking protection scheme when the adversary has full control over the user’s computer. Compared with existing hardware-based solutions, hPIN/hTAN depends on neither second trusted channel, nor secure keypad, nor computationally expensive encryption module. Due to the rapid progress of the Internet, e-banking has become more and more popular all ov...

متن کامل

End User Security Training for Identification and Access Management

Identification and access management (I/AM) is among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized disclosure of PII as, according to recent literatur...

متن کامل

Side-Channel Attacks on the Yubikey 2 One-Time Password Generator

The classical way of authentication with a username-password pair is often insufficient: an adversary can choose from a multitude of methods to obtain the credentials, e.g., by guessing passwords using a dictionary, by eavesdropping on network traffic, or by installing malware on the system of the target user. To overcome this problem, numerous solutions incorporating a second factor in the aut...

متن کامل

Improving Security of E- Commerce application by using Multifactor Authentication

All e-commerce environments require support for security properties such as authentication, authorization, data confidentiality, and non -repudiation. The most common method of authentication or protection against intrusion in a computer system is to use alphanumeric usernames and password. Choosing a strong password and protecting the chosen password has always been a popular topic among secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer and Information Science

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2015