Security Revisited: Honeytokens meet Google Authenticator
Συγγραφέας
Papaspirou V., Papathanasaki M., Maglaras L., Kantzavelou I., Douligeris C., Ferrag M.A., Janicke H.Ημερομηνία
2022Γλώσσα
en
Λέξη-κλειδί
Επιτομή
In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors improved existing authentication procedures and gave rise to new multi-factor authentication schemes, more advanced and focused assaults have revealed they are also sensitive and ineffective to assure only authorized access to systems. This study suggests a revolutionary two-factor authentication mechanism that uses QR codes and honeytokens. In the current implementation, honeywords and Google authenticator work together. In order to speed up the identification process, the honeywords technique is utilized as a second factor on a different computing device. By using a stronger and more effective authentication mechanism than a single password mechanism or a common two-factor authentication scheme, the novel and straightforward approach presented here intends to add additional layers of security and protection into a system, thereby increasing its security. © 2022 IEEE.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
Ferrag M.A., Maglaras L., Argyriou A., Kosmanos D., Janicke H. (2018)This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular ... -
A distributed biometric authentication scheme based on blockchain
Toutara F., Spathoulas G. (2020)Biometric authentication is the preferred authentication scheme in modern computing systems. While it offers enhanced usability, it also requires cautious handling of sensitive users' biometric templates. In this paper, a ... -
Using deep learning neural networks for ECG based authentication
Chamatidis I., Katsika A., Spathoulas G. (2017)Traditional password based authentication has been proven inadequate and the use of biometrics have provided multiple solutions through the past years. One of the most recent approaches to biometric authentication is using ...