Honeyword-based Authentication Techniques for Protecting Passwords: A Survey

被引:2
作者
Chakraborty, Nilesh [1 ]
Li, Jianqiang [1 ]
Leung, Victor C. M. [1 ]
Mondal, Samrat [2 ]
Pan, Yi [3 ]
Luo, Chengwen [1 ]
Mukherjee, Mithun [4 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518000, Guangdong, Peoples R China
[2] Indian Inst Technol Patna, Dept Comp Sci, Patna 801106, Bihar, India
[3] Georgia State Univ, Dept Comp Sci, 33 Gilmer St, Atlanta, GA 30302 USA
[4] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 211544, Jiangsu, Peoples R China
基金
美国国家科学基金会;
关键词
Honeyword; inversion attack; security; usability; password-file; Honey-Checker;
D O I
10.1145/3552431
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest in 2013, has emerged as a security mechanism that can provide security against server-side threats on the password-files. From the theoretical perspective, this security mechanism reduces attackers' efficiency to a great extent as it detects the threat on a password-file so that the system administrator can be notified almost immediately as an attacker tries to take advantage of the compromised file. This paper aims to present a comprehensive survey of the relevant research and technological developments in honeyword-based authentication techniques. We cover twenty-three techniques related to honeyword, reported under different research articles since 2013. This survey paper helps the readers to (i) understand how honeyword based security mechanism works in practice, (ii) get a comparative view on the existing honeyword based techniques, and (iii) identify the existing gaps that have yet to be filled and the emergent research opportunities.
引用
收藏
页数:37
相关论文
共 50 条
  • [1] User authentication via behavior based passwords
    Yampolskiy, Roman V.
    2007 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, 2007, : 10 - +
  • [2] An Innovative User Authentication Method: Replacements of Text Based Passwords
    Shukla, Varun
    Dixit, Shivani
    Kumar, Ravi
    Patidar, Manish
    INFORMATION SYSTEMS AND MANAGEMENT SCIENCE, ISMS 2021, 2023, 521 : 210 - 224
  • [3] A Survey on Authentication Techniques for the Internet of Things
    Albalawi, Afrah
    Almrshed, Amal
    Badhib, Arwa
    Alshehri, Suhair
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 271 - 275
  • [4] A Survey on Authentication Techniques for the Internet of Things
    Atwady, Yahya
    Hammoudeh, Mohammad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [5] Using Template-Based passwords for authentication in E-banking
    Kalayeh, Mahdi Rahimi Ghazi
    Nik, Mohammadreza Harati
    Kordestani, Hossain
    2013 7TH INTERNATIONAL CONFERENCE ON E-COMMERCE IN DEVELOPING COUNTRIES: WITH FOCUS ON E-SECURITY (ECDC), 2013,
  • [6] Enhancing Visual Passwords Using a Grid-Based Graphical Password Authentication to Mitigate Shoulder Surfing
    Paul, P. Mano
    Jingle, I. Berin Jeba
    Jingle, I. Diana Jeba
    FOURTH CONGRESS ON INTELLIGENT SYSTEMS, VOL 2, CIS 2023, 2024, 869 : 447 - 455
  • [7] A Survey of Authentication Techniques in Vehicular Ad Hoc Networks
    Farooq, Shaik Mullapathi
    Hussain, S. M. Suhail
    Ustun, Taha Selim
    IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE, 2021, 13 (02) : 39 - 52
  • [8] Mutual zero-knowledge Authentication based on Virtual Passwords per Session (MAVPS)
    Asimi, Younes
    Amghar, Abdellah
    Asimi, Ahmed
    Sadqi, Yassine
    2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2014, : 231 - 236
  • [9] Knowledge based Authentication Techniques and Challenges
    Alhakami, Hosam
    Alhrbi, Shouq
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (02) : 727 - 732
  • [10] A review of hashing based image authentication techniques
    Shaik, Abdul Subhani
    Karsh, Ram Kumar
    Islam, Mohiul
    Laskar, Rabul Hussain
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (02) : 2489 - 2516