VFA: A Variable-Factor Authentication Framework for Mobile Users
نویسندگان
چکیده
—Multi-factor authentication (MFA) has been widely used in various scenarios. By combining multiple forms of authentication, MFA effectively provides security assurance. Due to the rapid developments of mobile devices, especially smart phones, more and more sensitive information is now stored or accessible on smart phones. How to protect smart phones' security is now more important than ever. Unfortunately, because of the special features of smart phones such as computational limitations and input constraints, existing MFA schemes could not be directly used on smart phones. In this paper, we propose a new concept of Variable-Factor Authentication (VFA) for smart phones. VFA dynamically adjusts the number of authentication factors based on whether a user is suspicious or not. We implement a prototype to exam the performance. The experiment results show that, compared to MFA, VFA provides significant convenience to legitimate users whereas maintain the security protection to suspicious users.
منابع مشابه
A Secure Mobile Payment Framework Based On Face Authentication
With the increasing market share of the smartphone, more and more people use m-payment (mobile payment) to pay for something in their daily life. In this paper, a brand new m-payment framework which based on face authentication is proposed after studying existing m-payment security frameworks. On the basis of traditional password authentication technology, this new face authentication based fra...
متن کاملTwo Factor Authentication for Cloud Computing
— The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underly...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملA Unified Cloud Authenticator for Mobile Cloud Computing Environment
Mobile cloud computing (MCC) is just cloud computing in which at least some of the devices like mobiles, PDA etc are involved. This paper drives over several authentication techniques and methods for mobile cloud computing. An analysis of the existing works are carried out. This Paper also analyses the attacks and Issues that occur during authentication in the mobile cloud environment. Security...
متن کاملExploring Mobile Proxies for Better Password Authentication
Traditional textual password authentication techniques have numerous well-documented security and usability flaws, yet have seen near universal deployment due to their desirable efficiency properties. As a result, many users who may prefer alternative authentication approaches are forced to use passwords or PINs on a daily basis due to a lack of control over third party servers. This work explo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCM
دوره 10 شماره
صفحات -
تاریخ انتشار 2015