Security analysis for authentication and authorisation in mobile phone

被引:1
|
作者
Lewandowski, Piotr [1 ]
Felkner, Anna [1 ]
Janiszewski, Marek [1 ]
机构
[1] NASK Res & Acad Comp Network, R&D Div, Informat Secur Methods Team, Ul Kolska 12, PL-01045 Warsaw, Poland
来源
PRZEGLAD ELEKTROTECHNICZNY | 2019年 / 95卷 / 08期
关键词
Access control; Mobile communication systems; Security and Privacy Protection; Telephony;
D O I
10.15199/48.2019.08.29
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we discuss some authentication and authorisation systems where mobile phone is a main or an important component to improve security. Some of the presented solutions are available for SCADA software. Based on our analysis we list and compare safety measures and threats in mobile phone's technologies. We also briefly analyse the security models of the most popular solutions. Results of our analysis point out that the application generating one-time passwords is both secure and convenient for the users.
引用
收藏
页码:132 / 138
页数:7
相关论文
共 50 条
  • [1] Strong authentication with mobile phone as security token
    Do Van Thanh
    Jorstad, Ivor
    Jonvik, Tore
    Do Van Thuan
    [J]. 2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 1018 - 1023
  • [2] Design and Security Analysis of Mobile Identity Authentication Protocol
    Wang Qin
    Zhi Fenhe
    Ao Jinghai
    [J]. MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2645 - 2649
  • [3] A Study on Cell Phone Security Authentication Techniques
    Muhammad, Nooh Bany
    [J]. CONFERENCE PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2018, : 92 - 96
  • [4] Formal Analysis of PANA Authentication and Authorisation Protocol
    Gordon, Steven
    [J]. PDCAT 2008: NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2008, : 277 - 284
  • [5] Security and Authentication in the Mobile World
    Tero Ojanperä
    Risto Mononen
    [J]. Wireless Personal Communications, 2002, 22 : 229 - 235
  • [6] Security and authentication in the mobile world
    Ojanperä, T
    Mononen, R
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2002, 22 (02) : 229 - 235
  • [7] A fingerprint authentication system based on mobile phone
    Su, Q
    Tian, R
    Chen, XJ
    Yang, X
    [J]. AUDIO AND VIDEO BASED BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2005, 3546 : 151 - 159
  • [8] A Survey of Android Mobile Phone Authentication Schemes
    Douglas Kunda
    Mumbi Chishimba
    [J]. Mobile Networks and Applications, 2021, 26 : 2558 - 2566
  • [9] A Survey of Android Mobile Phone Authentication Schemes
    Kunda, Douglas
    Chishimba, Mumbi
    [J]. MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06): : 2558 - 2566
  • [10] MOBILE PHONE SECURITY - AWARENESS AND PRACTICES
    Androulidakis, Iosif
    Kandus, Gorazd
    [J]. JOURNAL OF THE INSTITUTE OF TELECOMMUNICATIONS PROFESSIONALS, 2013, 7 : 16 - 23