Honeyword-based Authentication Techniques for Protecting Passwords: A Survey

被引:2
作者
Chakraborty, Nilesh [1 ]
Li, Jianqiang [1 ]
Leung, Victor C. M. [1 ]
Mondal, Samrat [2 ]
Pan, Yi [3 ]
Luo, Chengwen [1 ]
Mukherjee, Mithun [4 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518000, Guangdong, Peoples R China
[2] Indian Inst Technol Patna, Dept Comp Sci, Patna 801106, Bihar, India
[3] Georgia State Univ, Dept Comp Sci, 33 Gilmer St, Atlanta, GA 30302 USA
[4] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 211544, Jiangsu, Peoples R China
基金
美国国家科学基金会;
关键词
Honeyword; inversion attack; security; usability; password-file; Honey-Checker;
D O I
10.1145/3552431
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest in 2013, has emerged as a security mechanism that can provide security against server-side threats on the password-files. From the theoretical perspective, this security mechanism reduces attackers' efficiency to a great extent as it detects the threat on a password-file so that the system administrator can be notified almost immediately as an attacker tries to take advantage of the compromised file. This paper aims to present a comprehensive survey of the relevant research and technological developments in honeyword-based authentication techniques. We cover twenty-three techniques related to honeyword, reported under different research articles since 2013. This survey paper helps the readers to (i) understand how honeyword based security mechanism works in practice, (ii) get a comparative view on the existing honeyword based techniques, and (iii) identify the existing gaps that have yet to be filled and the emergent research opportunities.
引用
收藏
页数:37
相关论文
共 50 条
  • [21] A Survey of RFID Authentication Protocols Based on Hash-Chain Method
    Syamsuddin, Irfan
    Dillon, Tharam
    Chang, Elizabeth
    Han, Song
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 559 - 564
  • [22] RFID Authentication Protocols Based on Error-Correcting Codes: A Survey
    Chikouche, Noureddine
    Cherif, Foudil
    Cayrel, Pierre-Louis
    Benmohammed, Mohamed
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 509 - 527
  • [23] Biometric based authentication and access control techniques to secure Mobile Cloud Computing
    Khatri, Sunil Kumar
    Monica
    Vadi, Vikas Rao
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 371 - 377
  • [24] Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions
    Al-Ghamdi, Abdullah Saad Al-Malaise
    Ragab, Mahmoud
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (02): : 3131 - 3144
  • [25] Edge Network Optimization Based on AI Techniques: A Survey
    Pooyandeh, Mitra
    Sohn, Insoo
    ELECTRONICS, 2021, 10 (22)
  • [26] Electrocardiogram signals-based user authentication systems using soft computing techniques
    Mehdi Hosseinzadeh
    Bay Vo
    Marwan Yassin Ghafour
    Sajjad Naghipour
    Artificial Intelligence Review, 2021, 54 : 667 - 709
  • [27] Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC
    Rajamanickam, Siranjeevi
    Vollala, Satyanarayana
    Amin, Ruhul
    Ramasubramanian, N.
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1972 - 1983
  • [28] Electrocardiogram signals-based user authentication systems using soft computing techniques
    Hosseinzadeh, Mehdi
    Vo, Bay
    Ghafour, Marwan Yassin
    Naghipour, Sajjad
    ARTIFICIAL INTELLIGENCE REVIEW, 2021, 54 (01) : 667 - 709
  • [29] A survey of Machine Learning-based Physical-Layer Authentication in wireless communications
    Meng, Rui
    Xu, Bingxuan
    Xu, Xiaodong
    Sun, Mengying
    Wang, Bizhu
    Han, Shujun
    Lv, Suyu
    Zhang, Ping
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 235
  • [30] A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches
    Lai, Zhifan
    Chang, Zikai
    Sha, Mingrui
    Zhang, Qihong
    Xie, Ning
    Chen, Changsheng
    Niyato, Dusit
    ACM COMPUTING SURVEYS, 2025, 57 (05)