Strong authentication with mobile phone as security token

被引:0
|
作者
Do Van Thanh [1 ]
Jorstad, Ivor [2 ]
Jonvik, Tore [3 ]
Do Van Thuan [4 ]
机构
[1] Telenor & NTNU, Trondheim, Norway
[2] Ubisafe, Oslo, Norway
[3] Oslo Univ Coll, Oslo, Norway
[4] Linus, Fornebu, Norway
关键词
Strong authentication; Two-factor authentication; Multi-factor authentication; Security token; Identity theft; Identity Management; User identification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The protection of digital identities is getting more and more crucial. The usage of passwords for authentication is no longer sufficient and stronger authentication schemes are necessary. Strong authentication solutions using two identification factors require often an additional device, which could be inconvenient for the user and costly for the service providers. To avoid the usage of additional device, the mobile phone is adopted as security token. This paper provides a study of the various ways the mobile phone can be used as an authentication token towards service providers on the Internet. It starts with discussing the need for a strong authentication scheme, and the motivation for using the mobile phone to improve on several aspects of the current authentication processes. Thereafter, the general architecture for authentication with mobile phones is presented. Several different authentication solutions using the mobile phone as authentication token are then described, where the solutions vary in complexity, strength and user-friendliness. The paper ends with an evaluation of the different solutions, and a discussion of the most probable attacks. A classification of the solutions is also provided, according to defined criteria.
引用
收藏
页码:1018 / 1023
页数:6
相关论文
共 50 条
  • [21] Strong Authentication for Internet Mobile Application
    Dostalek, Libor
    Ledvina, Jiri
    2015 INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS (AE), 2015, : 23 - 26
  • [22] Secure and Strong Mobile Cloud Authentication
    Hani, Qassim Bani
    Dichter, Julius P.
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 562 - 565
  • [23] Strong Authentication for Mobile Cloud Computing
    Ahmed-Nacer, Anis
    Ahmed-Nacer, Mehdi
    2016 13TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES FOR DISTRIBUTED SYSTEMS (NOTERE), 2016,
  • [24] A Security Authentication Method of Mobile RFID
    Bao, Songde
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1077 - 1081
  • [25] Method of security authentication for mobile agent
    Ding, J.G.
    Liu, H.L.
    Chen, H.S.
    Bai, Y.C.
    Jisuanji Gongcheng/Computer Engineering, 2001, 27 (02):
  • [26] A fingerprint authentication mobile phone based on sweep sensor
    Su, Q
    Tian, J
    Chen, XJ
    Yang, X
    PATTERN RECOGNITION AND IMAGE ANALYSIS, PT 2, PROCEEDINGS, 2005, 3687 : 295 - 301
  • [27] A mobile phone based authentication service for home appliances
    Mizuno, Shintaro
    Haruyama, Takahiro
    Yamada, Kohji
    Mizuno, Osamu
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 1168 - 1169
  • [28] SSI Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance
    Abraham, Andreas
    Schinnerl, Christopher
    More, Stefan
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 137 - 148
  • [29] Security Domain for the Sensor Nodes with Strong Authentication
    Furtak, Janusz
    Zielinski, Zbigniew
    Chudzikiewicz, Jan
    2019 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2019,
  • [30] Token Based Privacy Preserving and Authentication Technique for Wireless Mobile Networks
    Fatahpour, Saman
    2018 4TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2018, : 155 - 161