Token Based Authentication Using Mobile Phone
Digital identity is the key representation of user and getting most crucial subject for information security. The password based authentication is weak solution and no longer adequate. User select static password which is easy to guess and remember, relevant information or common for all authenticat...
Saved in:
| Published in | 2011 International Conference on Communication Systems and Network Technologies : 3-5 June 2011 pp. 85 - 88 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.06.2011
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781457705434 1457705435 |
| DOI | 10.1109/CSNT.2011.24 |
Cover
| Summary: | Digital identity is the key representation of user and getting most crucial subject for information security. The password based authentication is weak solution and no longer adequate. User select static password which is easy to guess and remember, relevant information or common for all authentication process. This simplicity makes weak authentication scheme, as so far, static passwords are known as easiest target for attackers. Further, Security Token based runtime interaction could extend the strength of authentication control. Security tokens can be used for strong authentication but inconvenient for user and costly for the service providers. To avoid the user inconvenient and extra cost mobile phone is an emerging alternative. These papers comprise the study of various digital identification schemes and give motivation to integrate mobile token. In order to establish standard for mobile token, work starts with the review of current schemes and explores the security architecture for strong authentication with mobile token. Password algorithm is derived to generate dynamic password for token authentication. Thereafter explore various authentication mechanisms to implement mobile token on different prospective. At the end, it describes the various test cases and evolutionary result of various attacks on suggested schemes. |
|---|---|
| ISBN: | 9781457705434 1457705435 |
| DOI: | 10.1109/CSNT.2011.24 |