Token Based Authentication Using Mobile Phone

Digital identity is the key representation of user and getting most crucial subject for information security. The password based authentication is weak solution and no longer adequate. User select static password which is easy to guess and remember, relevant information or common for all authenticat...

Full description

Saved in:
Bibliographic Details
Published in2011 International Conference on Communication Systems and Network Technologies : 3-5 June 2011 pp. 85 - 88
Main Authors Tanvi, P., Sonal, G., Kumar, S. M.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2011
Subjects
Online AccessGet full text
ISBN9781457705434
1457705435
DOI10.1109/CSNT.2011.24

Cover

More Information
Summary:Digital identity is the key representation of user and getting most crucial subject for information security. The password based authentication is weak solution and no longer adequate. User select static password which is easy to guess and remember, relevant information or common for all authentication process. This simplicity makes weak authentication scheme, as so far, static passwords are known as easiest target for attackers. Further, Security Token based runtime interaction could extend the strength of authentication control. Security tokens can be used for strong authentication but inconvenient for user and costly for the service providers. To avoid the user inconvenient and extra cost mobile phone is an emerging alternative. These papers comprise the study of various digital identification schemes and give motivation to integrate mobile token. In order to establish standard for mobile token, work starts with the review of current schemes and explores the security architecture for strong authentication with mobile token. Password algorithm is derived to generate dynamic password for token authentication. Thereafter explore various authentication mechanisms to implement mobile token on different prospective. At the end, it describes the various test cases and evolutionary result of various attacks on suggested schemes.
ISBN:9781457705434
1457705435
DOI:10.1109/CSNT.2011.24