Authentication systems: A literature review and classification (original) (raw)
Related papers
EFFECTIVENESS OF VARIOUS USER AUTHENTICATION TECHNIQUES
IAEME PUBLICATION, 2014
Text passwords are the most popular form of user authentication on the internet due to simplicity of the passwords. The internet users are required to remember many passwords to access their online accounts. These user passwords are prone to be stolen and compromised under different vulnerabilities. Passwords are compromised due to its simplicity of the passwords; the user select weak password that are easier to remember. The end users are not much concerned about the security issues and that’s why they go for simple passwords. This makes the textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many password based schemes with smart cards, graphical passwords and biometrics have been proposed; each scheme has its merits and demerits. In this paper, we analyzed and compared some of the user authentication mechanisms that are commonly used.
The usage of sensitive online services and applications such as online banking, e-commerce etc is increasing day by day. These technologies have tremendously improved making our daily life easier. However, these developments have been accompanied by E-piracy where attackers try to get access to services illegally. As sensitive information flow through Internet, they need support for security properties such as authentication, authorization, data confidentiality. Perhaps static password (User ID & password) is the most common and widely accepted authentication method. Online applications need strong password such as a combination of alphanumeric with special characters. In general, having one password for a single service may be easy to remember, but controlling many passwords for different services poses a tedious task on users online applications . Usually users try to use same password for different services or make slight changes in the password which can be easy for attacker to guess adding increased security threat. In order to overcome this, stronger authentication solutions need to be suggested and adapted for services based network.
A Study of Various Passwords Authentication Techniques
2015
Information and computer security is supported by passwords. Password is the principal part of authentication process. The traditional authentication method is to use text-based password which is also called alphanumeric password. But it has significant drawbacks. So to overcome vulnerabilities of this traditional password scheme a graphical password scheme is developed. But major drawback of graphical scheme is it is vulnerable to shoulder surfing attack and also sometimes to spyware attack. So alternative technique to graphical password a Captcha technique is developed. The major advantage of Captcha is that it can not be identified by bots. Captcha gives the protection from unwanted bots. Also there are some limitations of Captcha, and to overcome those after Captcha for more robust security a new technique is developed which is CaRP (Captcha as gRaphical Passwords).This paper will explore all the passwords techniques for security. General Terms Information Security, Password Tec...
A Critical appraisal on Password based Authentication
International Journal of Computer Network and Information Security
There is no doubt that, even after the development of many other authentication schemes, passwords remain one of the most popular means of authentication. A review in the field of password based authentication is addressed, by introducing and analyzing different schemes of authentication, respective advantages and disadvantages, and probable causes of the 'very disconnect' between user and password mechanisms. The evolution of passwords and how they have deep-rooted in our life is remarkable. This paper addresses the gap between the user and industry perspectives of password authentication, the state of art of password authentication and how the most investigated topic in password authentication changed over time. The author's tries to distinguish password based authentication into two levels 'User Centric Design Level' and the 'Machine Centric Protocol Level' under one framework. The paper concludes with the special section covering the ways in which password based authentication system can be strengthened on the issues which are currently holding-in the password based authentication.
A Study on the Security of Authentication Systems
2021
In the age of digitalization, passwords play a significant role to protect user information. The growing number of data breaches has become a major problem allowing unauthorised parties to access confidential data. Over the years, passwords have been the first factor of authentication that is used in various segments, such as web applications, banking, e-commerce, and applications for authentication, etc. In most cases, the passwords are usually assigned to or created by the authorized user, and must be kept secret to keep unauthorized users from having access to information it is meant to protect. However, recent attacks have shown that these passwords are vulnerable to attacks such as, the dictionary, brute force, man in the middle, traffic interception, social engineering, and key logger attack, etc. In this paper, we discuss different types of passwords that prevent unauthorised access to protect users’ information. We analyze various attack techniques that are leveraged in many...
Usable Authentication Schemes: A Critique
Usable authentication was given birth to as a result of memorability shortcoming; that is, low memorability of passwords by the users of authentication systems. To improve on the flaws of text based authentication schemes, usable authentication schemes have their architecture based on graphics in different varieties and compositions. This paper first presents several usable authentication schemes that are available, examining the architecture they are based upon. Next is a critique of the architecture of the described usable authentication schemes. Finally, the identified requirement for the described usable authentication systems is reflected upon.
A Text based Authentication Scheme for Improving Security of Textual Passwords
International Journal of Advanced Computer Science and Applications
User authentication through textual passwords is very common in computer systems due to its ease of use. However textual passwords are vulnerable to different kinds of security attacks, such as spyware and dictionary attacks. In order to overcome the deficiencies of textual password scheme, many graphical password schemes have been proposed. The proposed schemes could not fully replace textual passwords, due to usability and security issues. In this paper a text based user authentication scheme is proposed which improves the security of textual password scheme by modifying the password input method and adding a password transformation layer. In the proposed scheme alphanumeric password characters are represented by random decimal numbers which resist online security attacks such as shoulder surfing and key logger attacks. In the registration process password string is converted into a completely new string of symbols or characters before encryption. This strategy improves password security against offline attacks such as brute-force and dictionary attacks. In the proposed scheme passwords consist of alphanumeric characters therefore users are not required to remember any new kind of passwords such as used in graphical authentication. Hence password memorability burden has been minimized. However mean authentication time of the proposed scheme is higher than the textual password scheme due to the security measures taken for the online attacks.
Authentication Methods: A Conceptual Review
2020
In order to access any of the information or data, we require to authenticate the user so that only the authorized users can access the data. With the development of science and technology there are number of authentication methods and this paper reviews the various types of available authentication schemes and methods Keyword: Graphical Passwords, Grid Passwords, Security,