Security Revisited: Honeytokens meet Google Authenticator
Συγγραφέας
Papaspirou V., Papathanasaki M., Maglaras L., Kantzavelou I., Douligeris C., Ferrag M.A., Janicke H.Ημερομηνία
2022Γλώσσα
en
Λέξη-κλειδί
Επιτομή
In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors improved existing authentication procedures and gave rise to new multi-factor authentication schemes, more advanced and focused assaults have revealed they are also sensitive and ineffective to assure only authorized access to systems. This study suggests a revolutionary two-factor authentication mechanism that uses QR codes and honeytokens. In the current implementation, honeywords and Google authenticator work together. In order to speed up the identification process, the honeywords technique is utilized as a second factor on a different computing device. By using a stronger and more effective authentication mechanism than a single password mechanism or a common two-factor authentication scheme, the novel and straightforward approach presented here intends to add additional layers of security and protection into a system, thereby increasing its security. © 2022 IEEE.
Collections
Related items
Showing items related by title, author, creator and subject.
-
A review of rice authenticity/adulteration methods and results
Vlachos, A.; Arvanitoyannis, I. S. (2008)Rice importance resides in its high consumption mainly in Asia and Africa and less in the EU. Several cultivars, both GM and non-GM, have established themselves in various regions depending mainly on the climatic and soil ... -
Χρήση ηλεκτροκαρδιογραφήματος για τη βιομετρική αυθεντικοποίηση χρηστών
Κατσίκα, Αγγελική Ι. (2018) -
Implementation of quality control methods (physico-chemical, microbiological and sensory) in conjunction with multivariate analysis towards fish authenticity
Arvanitoyannis, I. S.; Tsitsika, E. V.; Panagiotaki, P. (2005)Nowadays authenticity of foods and fish in particular has become of crucial importance because of high number of adulteration cases. Authenticity control has gained ground thanks to the development of several rapid ...


