Open Access Open Access  Restricted Access Subscription Access

A Survey on User Authentication Techniques


Affiliations
1 Department of CSE, Aurora’s Research and Technological Institute, Warangal, Telangana, India
2 Department of CSE, Vaagdevi College of Engineering, Warangal, Telangana, India
3 Department of CSE, Central University of Rajasthan, Rajasthan, India
 

Confidentiality and Authentication were once treated different but now-a-days, improvement in technology is demanding both of them to be used together. Though technology is increasing tremendously, smart hackers on the environment always challenges the authentication factors, thereby enforcing more number of factors for authentication to be included. As factors increase, failure rate for authentication may also be more when any one of the factors doesn't work. A qualitative survey of user authentication systems being used in today's environment is presented here and a comparative study of various authentication mechanisms used in the world of Information security by various researchers is shown.

Keywords

Authentication, Cryptography, Smart Cards, Social Authentication, Tokens, Vouching.
User
Notifications
Font Size

  • Haga, W. J. and M. Zviran, Cognitive Passwords: From Theory to Practice, Data Processing and Communications Security. In 8th Conference on exploring the challenges on e-business, 2009; 13(3): pp. 19-23.
  • Moshe Zviran, Zippy Erlich, Identification and authentication: technology and implementation issues. In Communications of AIS, Volume 17, Article 4.
  • John Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung, Fourth Factor Authentication: Somebody You Know. In Proc. of the 13th ACM Conference on Computer and communications security, 2006; pp. 168-178.
  • John Brainard, Ari Juels, Burt Kaliski, Michael Szydlo, A new two-server approach for authentication with short secrets. In Proc. Int, conf. on USENIX Security Symposium , 2003; pp 14.
  • Stuart Schechter, Serge Egelman, Robert W. Reeder, It’s Not What You Know, But Who You Know: A social approach to last-resort authentication, CHI 2009, Boston, USA
  • Stephen S. Hamilton, Martin C. Carlisle, and John A. Hamilton, A Global Look at Authentication. In Proc. of IEEE Workshop on Information Assurance and security workshop, 2007.
  • Fadi Aloul, Syed Zahidi, Wassim El-Hajj, Two Factor Authentication Using Mobile Phones, In The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2009.
  • Muthucumaru Maheswaran, Bijan Soleymani, Social Authentication Protocol for Mobile Phones. In Proc. IEEE 16th Int. Conf. on Computational Science and Engineering, 2009; pp: 436-444.
  • Brostoff and A. M. Sasse, Ten strikes and you’re out: Increasing the number of login attempts can improve password usability. In Proc. Int. Conf on HCI and Security Systems, 2003.
  • Magno, Marianna B. Monterey, Survey of user authentication mechanisms. Naval Postgraduate School: Monterey, CA 93943-5000.
  • Yang, G., Wong, D. S., Wang, H. & Deng, X, Two-factor mutual authentication based on smart cards and passwords. In Journal of Computer and System Sciences, 2008; pp. 1160-1172.
  • Payas GUPTA, Exploiting Human Factors in User Authentication, Institutional Knowledge at Singapore Management University, 2013.
  • Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, Robert H. Deng, A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. In IEEE Transactions on Parallel and Distributed Systems, 2011; pp 1390-1397
  • Jiøí Sobotka, Radek Doležel, Multifactor authentication systems. In electro revue, vol. 1, 2010.
  • Fabian Monrose, Michael K. Reiter, Qi Li, and Susanne Wetzel, Cryptographic key generation from voice. In Proc. Int. Conf on Security and Privacy, 2001.
  • Gkarafli, S. & Economides, An experimental survey and comparison of proof by knowledge authentication techniques. International Journal of Applied Research on Information Technology and Computing, 2010.
  • Sung Choi and David Zage, Addressing Insider Threat using “Where You Are” as Fourth Factor Authentication, In IEEE International Carnahan Conference on Security Technology, 2012; pp. 147-153.
  • Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, Robert H. Deng, A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. In IEEE Transactions, 2011; pp 1390-1397.

Abstract Views: 248

PDF Views: 5




  • A Survey on User Authentication Techniques

Abstract Views: 248  |  PDF Views: 5

Authors

K. Sharmila
Department of CSE, Aurora’s Research and Technological Institute, Warangal, Telangana, India
V. Janaki
Department of CSE, Vaagdevi College of Engineering, Warangal, Telangana, India
A. Nagaraju
Department of CSE, Central University of Rajasthan, Rajasthan, India

Abstract


Confidentiality and Authentication were once treated different but now-a-days, improvement in technology is demanding both of them to be used together. Though technology is increasing tremendously, smart hackers on the environment always challenges the authentication factors, thereby enforcing more number of factors for authentication to be included. As factors increase, failure rate for authentication may also be more when any one of the factors doesn't work. A qualitative survey of user authentication systems being used in today's environment is presented here and a comparative study of various authentication mechanisms used in the world of Information security by various researchers is shown.

Keywords


Authentication, Cryptography, Smart Cards, Social Authentication, Tokens, Vouching.

References





DOI: https://doi.org/10.13005/ojcst%2F10.02.37