Strong authentication with mobile phone as security token

被引:0
|
作者
Do Van Thanh [1 ]
Jorstad, Ivor [2 ]
Jonvik, Tore [3 ]
Do Van Thuan [4 ]
机构
[1] Telenor & NTNU, Trondheim, Norway
[2] Ubisafe, Oslo, Norway
[3] Oslo Univ Coll, Oslo, Norway
[4] Linus, Fornebu, Norway
关键词
Strong authentication; Two-factor authentication; Multi-factor authentication; Security token; Identity theft; Identity Management; User identification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The protection of digital identities is getting more and more crucial. The usage of passwords for authentication is no longer sufficient and stronger authentication schemes are necessary. Strong authentication solutions using two identification factors require often an additional device, which could be inconvenient for the user and costly for the service providers. To avoid the usage of additional device, the mobile phone is adopted as security token. This paper provides a study of the various ways the mobile phone can be used as an authentication token towards service providers on the Internet. It starts with discussing the need for a strong authentication scheme, and the motivation for using the mobile phone to improve on several aspects of the current authentication processes. Thereafter, the general architecture for authentication with mobile phones is presented. Several different authentication solutions using the mobile phone as authentication token are then described, where the solutions vary in complexity, strength and user-friendliness. The paper ends with an evaluation of the different solutions, and a discussion of the most probable attacks. A classification of the solutions is also provided, according to defined criteria.
引用
收藏
页码:1018 / 1023
页数:6
相关论文
共 50 条
  • [31] Improving accessibility and security for mobile phone shopping
    Lee, S
    Park, S
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 124 - 133
  • [32] A Study on Mobile Phone Security Industrial Ecology
    Chen, Qiyu
    Hu, Jinlong
    Zhang, Ling
    INTERNET OF THINGS-BK, 2012, 312 : 409 - 414
  • [33] A Research on the Security of the Intelligent Mobile Phone System
    Li Nawen
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 49 - 52
  • [34] Improving accessibility and security for mobile phone shopping
    Shingyeong University, Hwaseong-si, Gyeonggi-do, Korea, Republic of
    不详
    J. Comput. Inf. Syst., 2006, 3 (124-133):
  • [35] A Strong Authentication Method for Web/Mobile Services
    Kambou, Samy
    Bouabdallah, Ahmed
    2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 124 - 129
  • [36] A novel application of the phone card and its authentication in mobile communications
    Lee, CH
    Hwang, MS
    Yang, WP
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (04) : 471 - 484
  • [37] A Mobile Phone Device as a Biometrics Authentication Method for an ATM Terminal
    Albahbooh, Nabeel Ali
    Bours, Patrick
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 2017 - 2024
  • [38] A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error
    Thang Hoang
    Choi, Deokjai
    Viet Vo
    Anh Nguyen
    Thuc Nguyen
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 83 - 101
  • [39] Affective Design Approach to Mobile Security Authentication
    Park, Daehee
    Lee, Jaeyong
    Lee, Yenah
    Song, Scott
    HUMAN SYSTEMS ENGINEERING AND DESIGN, IHSED2018, 2019, 876 : 553 - 558
  • [40] A Review on Secure Authentication Mechanisms for Mobile Security
    Ul Hasan, Syed Shabih
    Ghani, Anwar
    Daud, Ali
    Akbar, Habib
    Khan, Muhammad Faizan
    SENSORS, 2025, 25 (03)