RFID Factor Authentication Application For Trusted Identities in Cyberspace

نویسندگان

  • Jing-Chiou Liou
  • Gregory Egan
  • Jay K. Patel
  • Sujith Bhashyam
چکیده

There are over 2.2 billion Internet users around the world as of December 31 2011, according to the Internet World Stats (IWS) [1]. Online service is an important driving force behind many of today’s Web 2.0 and cloud computing applications. For security and privacy concerns, authentication is utilized by all online services that involve online transactions and restricted information access. Authentication is the process of verifying a user’s credentials when they are requesting services from any secure system. The most commonly form of authentication is the single-factor authentication, which only requires one factor for the user to log into the system. In this case, the username and password together act as a single-factor. A more secure technique is the multi-factor authentication, which requires more than one factor to gain access into a particular system. As the multi-factor authentication getting matured in its currently available methods, hostile actions have been observed against some of the multi-factor authentication techniques. In this paper, we propose a RFID Factor Authentication Application (RFAA); an enhanced technique from SofToken [2] that acts as an improved technique for two-factor authentication. The RFAA not only sustains the next level of security but also is proven to prevent most of security breaches. This RFID enhancement on SofToken is designed especially for computer system access using two-factor authentication to improve the security measure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFID-based Electronic Identity Security Cloud Platform in Cyberspace

With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic...

متن کامل

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

User Authentication from Web Browsing Behavior

As anticipated in True Names by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and deterring malicious activities. As more people use the Web to communicate, work, and otherwise have fun, is it possible to uniquely identify someone based on their Web browsing behavior or to differentiate between...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

Re: Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace

1. Will the process and outcome be seen as publicly legitimate? The envisioned identity ecosystem will affect many people in many ways, but the “steering” process will have questionable legitimacy unless it is open and genuinely representative of users’ interests. More generally, we question whether any putatively representative stakeholder process can be perceived as publicly legitimate in the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012