An Overview on Authentication Approaches and Their Usability in Conjunction with Internet and Mobile Applications

作者: Sangare Mamoudou , Wajdi Al-Khateeb

DOI:

关键词: Password strengthComputer scienceComputer securityCognitive passwordPassword policyPasswordOne-time passwordInternet privacyS/KEYChallenge–response authenticationUser identifier

摘要: The usage of sensitive online services and applications such as banking, e-commerce etc is increasing day by day. These technologies have tremendously improved making our daily life easier. However, these developments been accompanied E-piracy where attackers try to get access illegally. As information flow through Internet, they need support for security properties authentication, authorization, data confidentiality. Perhaps static password (User ID & password) the most common widely accepted authentication method. Online strong a combination alphanumeric with special characters. In general, having one single service may be easy remember, but controlling many passwords different poses tedious task on users . Usually use same or make slight changes in which can attacker guess adding increased threat. order overcome this, stronger solutions suggested adapted based network.

参考文章(9)
Mohammed Hamad Alzomai, Identity management : strengthening one-time password authentication through usability Faculty of Science and Technology; Information Security Institute. ,(2011)
HoonJae Lee, Young Sil Lee, HyoTaek Lim, A study on efficient OTP generation using stream cipher with random digit international conference on advanced communication technology. ,vol. 2, pp. 1670- 1675 ,(2010)
Mahmoud Musa Mohammed, Muna Elsadig, A multi-layer of multi factors authentication model for online banking services international conference on computing electrical and electronic engineering. pp. 220- 224 ,(2013) , 10.1109/ICCEEE.2013.6633936
Z. Zareh Hosseini, E. Barkhordari, Enhancement of security with the help of real time authentication and one time password in e-commerce transactions conference on information and knowledge technology. pp. 268- 273 ,(2013) , 10.1109/IKT.2013.6620077
L. O'Gorman, Comparing passwords, tokens, and biometrics for user authentication Proceedings of the IEEE. ,vol. 91, pp. 2021- 2040 ,(2003) , 10.1109/JPROC.2003.819611
Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun, A Design of One-Time Password Mechanism Using Public Key Infrastructure networked computing and advanced information management. ,vol. 1, pp. 18- 24 ,(2008) , 10.1109/NCM.2008.77
Fadi Aloul, Syed Zahidi, Wassim El-Hajj, Two factor authentication using mobile phones acs/ieee international conference on computer systems and applications. pp. 641- 644 ,(2009) , 10.1109/AICCSA.2009.5069395
S. Chaudhari, S. S. Tomar, A. Rawat, Design, implementation and analysis of multi layer, Multi Factor Authentication (MFA) setup for webmail access in multi trust networks 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC). pp. 27- 32 ,(2011) , 10.1109/ETNCC.2011.5958480
Ayman Hammad, Patrick Faith, Location based authentication ,(2008)