User perspective and security of a new mobile authentication method

被引:5
|
作者
Laka, Pawel [1 ]
Mazurczyk, Wojciech [1 ]
机构
[1] Warsaw Univ Technol, Inst Telecommun, Fac Elect & Informat Technol, 15-19 Nowowiejska Str, PL-00665 Warsaw, Poland
关键词
Authentication convenience; Smart cards; Security; User experience; VERIFICATION; NETWORK; SYSTEM;
D O I
10.1007/s11235-018-0437-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper describes a new mobile authentication method which is based on an Open ID Connect standard and subscriber identity module card. The proposed solution enables users to access websites, services and applications without the need to remember passwords, responses or support of any equipment. The proposed method is evaluated from the users' perspective as well as from the security viewpoint. Moreover, we compare it with the two most popular existing authentication schemes i.e. static passwords and SMS OTP (one time password). In order to evaluate user's view on various authentication methods a questionnaire was prepared and distributed among 40 participants. Obtained results revealed that the new authentication scheme yielded better results than the existing methods. Finally, we also performed a security analysis with respect to all abovementioned authentication solutions to assess whether there are any major risks related to the proposed method.
引用
收藏
页码:365 / 379
页数:15
相关论文
共 50 条
  • [1] User perspective and security of a new mobile authentication method
    Pawel Laka
    Wojciech Mazurczyk
    [J]. Telecommunication Systems, 2018, 69 : 365 - 379
  • [2] A Security Authentication Method of Mobile RFID
    Bao, Songde
    [J]. COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1077 - 1081
  • [3] Method of security authentication for mobile agent
    Ding, J.G.
    Liu, H.L.
    Chen, H.S.
    Bai, Y.C.
    [J]. Jisuanji Gongcheng/Computer Engineering, 2001, 27 (02):
  • [4] A User Security Continuous Authentication Method for Earable Devices
    Wang, Yong
    Xiong, Yi
    Yang, Tianyu
    Shen, Yiran
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (11): : 2821 - 2834
  • [5] MOBILE-BASED CONTINUOUS USER AUTHENTICATION SYSTEM FOR CLOUD SECURITY
    Li, Qing
    Wang, Le
    Kim, TaeGuen
    Im, Eul Gyu
    [J]. PROCEEDINGS OF 2016 5TH IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2016), 2016, : 176 - 179
  • [6] Web based Security with LOPass User Authentication Protocol in Mobile Application
    Bhole, Ashish T.
    Chaudhari, Sheetal
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 250 - 255
  • [7] User Authentication Method using Shaking Actions in Mobile Devices
    Lee, Tae Kyong
    Kim, Tae Guen
    Im, Eul Gyu
    [J]. 2016 RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS, 2016, : 142 - 147
  • [8] Peer-to-peer security in mobile devices: A user perspective
    Campadello, S
    [J]. FOURTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2004, : 252 - 257
  • [9] User Authentication for Mobile Devices
    Rogowski, Marcin
    Saeed, Khalid
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 47 - 58
  • [10] A new user authentication protocol for mobile terminals in wireless network
    Information Technology R and D Center, Mitsubishi Electric Corporation, Japan
    不详
    [J]. Proc. IEEE Int. Conf. Mobile Data Manage., (94-98):