A novel Two-Factor HoneyToken Authentication Mechanism
Datum
2021Language
en
Schlagwort
Zusammenfassung
The majority of systems rely on user authentication on passwords, but passwords have so many weaknesses and widespread use that easily raise significant security concerns, regardless of their encrypted form. Users hold the same password for different accounts, administrators never check password files for flaws that might lead to a successful cracking, and the lack of a tight security policy regarding regular password replacement are a few problems that need to be addressed. The proposed research work aims at enhancing this security mechanism, prevent penetrations, password theft, and attempted break-ins towards securing computing systems. The selected solution approach is two-folded; it implements a two-factor authentication scheme to prevent unauthorized access, accompanied by Honeyword principles to detect corrupted or stolen tokens. Both can be integrated into any platform or web application with the use of QR codes and a mobile phone. © 2021 IEEE.
Collections
Verwandte Dokumente
Anzeige der Dokumente mit ähnlichem Titel, Autor, Urheber und Thema.
-
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
Ferrag M.A., Maglaras L., Argyriou A., Kosmanos D., Janicke H. (2018)This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G cellular ... -
Security Revisited: Honeytokens meet Google Authenticator
Papaspirou V., Papathanasaki M., Maglaras L., Kantzavelou I., Douligeris C., Ferrag M.A., Janicke H. (2022)In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors ... -
A distributed biometric authentication scheme based on blockchain
Toutara F., Spathoulas G. (2020)Biometric authentication is the preferred authentication scheme in modern computing systems. While it offers enhanced usability, it also requires cautious handling of sensitive users' biometric templates. In this paper, a ...