Authentication Essay

1230 Words3 Pages

The inherent challenges of the security issue have become a top priority in every organization that makes use of information. Securing digital identities is getting more and more crucial. For authentication the usage of passwords is no longer sufficient because it faces most modern means of attacks and thus stronger authentication schemes are needed. Strong authentication solutions having two identification factors require often an additional device, which could be difficult for the user and costly for the service providers. In order to avoid the use of additional device, mobile phone is adopted as security token. This paper introduces a concept where mobile miss call is used as an additional password to the application. For lot of security reasons one generally requires a very secure password, to implement the same the focus of this paper is on Authentication using mobile phone as security token and a mobile missed call is a unique one.

Keywords— Strong Authentication, Security token, Two-factor authentication
I. INTRODUCTION
In many areas such as banks, governmental applications, educational institutions, healthcare industry, military organization, etc. security has become an important aspect. The systems today depend on static passwords to authenticate the user’s identity. However, management of static password has major security concerns. However, static passwords have some major management security concerns. Mostly the users make a choice of using password that are easy-to-guess passwords and write the passwords or store them on their machines, makes use of the same password in multiple accounts, etc. Furthermore, hackers have the option of using many techniques to steal passwords such as shoulder surfing, snif...

... middle of paper ...

... provides enhanced security to a machine and makes it difficult for the attacker to gain access to system’s resources.
The performance of research work can be measured based in various security properties. Parameters such as cost, time, usability, requirement, etc can be used to determine the efficiency. The proposed work can be protected from various attacks like Password cracking, Password sniffing, Man-in-Middle, Brute Force,etc. Password cracking is the process of recovering passwords from data that have been stored in computer system. Thus due to the use of additional password in proposed system such attacks can be avoided.
Thus the performance of the system can be enhanced by achieving the CIA (Confidentiality, Integrity, and Availability) properties. The research work also enhances the image of the organization by securing user credentials more effectively.

More about Authentication Essay

Open Document