Skip to main content

2013 | OriginalPaper | Buchkapitel

65. Multi-Factor Authentication Process Using More than One Token with Watermark Security

verfasst von : Arjun Kumar, Hoon Jae Lee

Erschienen in: Future Information Communication Technology and Applications

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authentication is the process of verifying a user’s credentials when they are requesting services from any secure system. A simple authentication only involves a username and password, which can be easily deciphered. Hacking technologies have become more diversified and advanced, security and authentication have become unable to rely on ID and password-based authentication alone. Single-factor authentication using an ID and password has been found to be vulnerable to malware attacks, replay attacks, offline brute force attacks, key logger trojans, dictionary attacks and shoulder surfing. Adding a strong factor will reduce the chances of the user’s identification from being hacked. This paper proposes a new multifactor authentication scheme, which combines with hard token, password and biometric token with watermark image. Compared with the previous schemes this scheme has higher security in remote authentication and lower communication complexity.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lee JK, Ryu SR (2002) Fingerprint-based remote user authentication scheme using smart cards. Electron Lett 38(12):554–555 Lee JK, Ryu SR (2002) Fingerprint-based remote user authentication scheme using smart cards. Electron Lett 38(12):554–555
2.
Zurück zum Zitat Kim HS, Lee SW, Yoo KY (2003) ID-based password authentication scheme using smart cards and fingerprints. SIGOPS Oper Syst 37:32–41CrossRef Kim HS, Lee SW, Yoo KY (2003) ID-based password authentication scheme using smart cards and fingerprints. SIGOPS Oper Syst 37:32–41CrossRef
3.
Zurück zum Zitat Yoon EJ, Yoo KE (2005) Secure fingerprint-based remote user authentication scheme using smartcards. In: Deng X, Ye Y (eds) LNCS, vol 3828. Springer, Heidelberg, pp 405–413 Yoon EJ, Yoo KE (2005) Secure fingerprint-based remote user authentication scheme using smartcards. In: Deng X, Ye Y (eds) LNCS, vol 3828. Springer, Heidelberg, pp 405–413
4.
Zurück zum Zitat Pointcheval D, Zimmer S (2008) Multi-factor authenticated key exchange. ACNS 2008, LNCS, vol 5037. Springer, Heidelberg, pp 277–295 Pointcheval D, Zimmer S (2008) Multi-factor authenticated key exchange. ACNS 2008, LNCS, vol 5037. Springer, Heidelberg, pp 277–295
5.
Zurück zum Zitat Fan CI, Lin YH (2009) Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. Trans Info Sec 4:933–945CrossRef Fan CI, Lin YH (2009) Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. Trans Info Sec 4:933–945CrossRef
6.
Zurück zum Zitat Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33:1–5CrossRef Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33:1–5CrossRef
7.
Zurück zum Zitat Kim J, Hong S (2011) A method of risk assessment for multi-factor authentication. J Info Pro Sys 7:187–198 Kim J, Hong S (2011) A method of risk assessment for multi-factor authentication. J Info Pro Sys 7:187–198
8.
Zurück zum Zitat Lin C-H, Lai Y-Y (2004) A flexible biometrics remote user authentication scheme. Comput Stand Interfaces 27:19–23 Lin C-H, Lai Y-Y (2004) A flexible biometrics remote user authentication scheme. Comput Stand Interfaces 27:19–23
9.
Zurück zum Zitat Yoon E-J, Yoo K-Y (2005) A new efficient fingerprint-based remote user authentication scheme for multimedia systems. KES 05, LNCS, vol 3683. Springer, Heidelberg, pp 332–338 Yoon E-J, Yoo K-Y (2005) A new efficient fingerprint-based remote user authentication scheme for multimedia systems. KES 05, LNCS, vol 3683. Springer, Heidelberg, pp 332–338
10.
Zurück zum Zitat OMB M-04-04 (2003) E-authentication guidance for Federal agencies. Dec 16 OMB M-04-04 (2003) E-authentication guidance for Federal agencies. Dec 16
11.
Zurück zum Zitat NIST (2006) Special publication 800-63. Electronic authentication guideline NIST (2006) Special publication 800-63. Electronic authentication guideline
12.
Zurück zum Zitat IETF RFC 4683 (2006) Internet X.509 public key infrastructure subject identification method (SIM) IETF RFC 4683 (2006) Internet X.509 public key infrastructure subject identification method (SIM)
Metadaten
Titel
Multi-Factor Authentication Process Using More than One Token with Watermark Security
verfasst von
Arjun Kumar
Hoon Jae Lee
Copyright-Jahr
2013
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-6516-0_65

Neuer Inhalt