A Two-factor Authentication Mechanism Using Mobile Phones
نویسندگان
چکیده
Mobile devices are becoming more pervasive and more advanced with respect to their processing power and memory size. Relying on the personalized and trusted nature of such devices, security features can be deployed on them in order to uniquely identify a user to a service provider. In this paper, we present a strong authentication mechanism that exploits the use of mobile devices to provide a two-factor authentication method. Our approach uses a combination of one-time passwords, as the first authentication factor, and credentials stored on a mobile device, as the second factor, to offer a strong and secure authentication approach. We also present an analysis of the security and usability of this mechanism. The security protocol is analyzed against an adversary model; this evaluation proves that our method is safe against various attacks, most importantly key logging, shoulder surfing, and phishing attacks. Our usability evaluation shows that, although our technique does add a layer of indirectness that lessens usability, participants were willing to tradeoff that usability for enhanced security once they became aware of the potential threats when using an untrusted computer. ∗This and other LERSSE publications can be found at lersse-dl.ece.ubc.ca
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملAnalyzing two-factor authentication devices
It is expected that mobile phones will be used in various e-commerce applications, since it is handy and frequently used. Another important aspect is that mobile phones approach computers both with respect to programmability and capacity. One example of a cutting edge application is a generic authentication mechanism invented by a new Norwegian startup company: a mobile terminal is used as a pa...
متن کاملMoViSign: A novel authentication mechanism using mobile virtual signatures
Signatures are a popular means of authentication. They, ideally, are unique to a person and, therefore, hard to copy. Two common types of signatures are traditional “pen-on-paper” signatures and electronic signatures. Electronic signatures are done on a custom-built electronic board using a stylus. The electronic board records information such as pressure, acceleration, and angle of the stylus ...
متن کاملVFA: A Variable-Factor Authentication Framework for Mobile Users
—Multi-factor authentication (MFA) has been widely used in various scenarios. By combining multiple forms of authentication, MFA effectively provides security assurance. Due to the rapid developments of mobile devices, especially smart phones, more and more sensitive information is now stored or accessible on smart phones. How to protect smart phones' security is now more important than ever. ...
متن کامل