Strong authentication with mobile phone as security token

被引:0
|
作者
Do Van Thanh [1 ]
Jorstad, Ivor [2 ]
Jonvik, Tore [3 ]
Do Van Thuan [4 ]
机构
[1] Telenor & NTNU, Trondheim, Norway
[2] Ubisafe, Oslo, Norway
[3] Oslo Univ Coll, Oslo, Norway
[4] Linus, Fornebu, Norway
关键词
Strong authentication; Two-factor authentication; Multi-factor authentication; Security token; Identity theft; Identity Management; User identification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The protection of digital identities is getting more and more crucial. The usage of passwords for authentication is no longer sufficient and stronger authentication schemes are necessary. Strong authentication solutions using two identification factors require often an additional device, which could be inconvenient for the user and costly for the service providers. To avoid the usage of additional device, the mobile phone is adopted as security token. This paper provides a study of the various ways the mobile phone can be used as an authentication token towards service providers on the Internet. It starts with discussing the need for a strong authentication scheme, and the motivation for using the mobile phone to improve on several aspects of the current authentication processes. Thereafter, the general architecture for authentication with mobile phones is presented. Several different authentication solutions using the mobile phone as authentication token are then described, where the solutions vary in complexity, strength and user-friendliness. The paper ends with an evaluation of the different solutions, and a discussion of the most probable attacks. A classification of the solutions is also provided, according to defined criteria.
引用
收藏
页码:1018 / 1023
页数:6
相关论文
共 50 条
  • [1] AN IDENTIFY AUTHENTICATION SYSTEM BASED ON MOBILE PHONE TOKEN
    Peng, Kunyu
    Zheng, Jiande
    Yang, Jing
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 570 - 575
  • [2] Security analysis for authentication and authorisation in mobile phone
    Lewandowski, Piotr
    Felkner, Anna
    Janiszewski, Marek
    PRZEGLAD ELEKTROTECHNICZNY, 2019, 95 (08): : 132 - 138
  • [3] Token based authentication for handover security
    Cheng, Y
    Norefors, A
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 231 - 243
  • [4] Bringing strong authentication and transaction security to the realm of mobile devices
    Ortiz-Yepes, D. A.
    Hermann, R. J.
    Steinauer, H.
    Buhler, P.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2014, 58 (01)
  • [5] Mobile Payment Protocol Based on Dynamic Mobile Phone Token
    Zhang, Xuewang
    Zeng, Hao
    Zhang, Xuewang
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 680 - 685
  • [6] Strong mobile authentication
    Hassinen, M
    Hyppönen, K
    2nd International Symposium on Wireless Communications Systems 2005 (ISWCS 2005), 2005, : 96 - 100
  • [7] A Novel Authentication Protocol with Strong Security for Roaming Service in Global Mobile Networks
    Liu, Shanpeng
    Li, Xiong
    Wu, Fan
    Liao, Junguo
    Wang, Jin
    Lin, Dingbao
    ELECTRONICS, 2019, 8 (09)
  • [8] A Study on Cell Phone Security Authentication Techniques
    Muhammad, Nooh Bany
    CONFERENCE PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2018, : 92 - 96
  • [9] Security and Authentication in the Mobile World
    Tero Ojanperä
    Risto Mononen
    Wireless Personal Communications, 2002, 22 : 229 - 235
  • [10] Security and authentication in the mobile world
    Ojanperä, T
    Mononen, R
    WIRELESS PERSONAL COMMUNICATIONS, 2002, 22 (02) : 229 - 235