Securing Password in Static Password-based Authentication: A Review

被引:0
作者
Mohamedali, Intisar A. [1 ]
Fadlalla, Yahia [2 ]
机构
[1] Sudan Univ Sci & Technol, Fac Comp Sci, Khartoum, Sudan
[2] InfoSec Consulting, Hamilton, ON, Canada
来源
PROCEEDINGS OF 2017 SUDAN CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (SCCSIT) | 2017年
关键词
Secure authentication; Password; Malware attacks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication is the process of verifying credentials provided by a user against stored ones to ensure that the claimer is who s/he says they are Ill. Securing user's input is vital to protect the privacy of a user's credentials and to deny any illegal use as result of theft or leakage. Password-based authentication is a commonly used form of authentication and it is the most susceptible type to different kind of attacks. Protecting password using software and hardware measures will enhance the security of authentication and mitigate attacks. Many researches have been conducted in this field and yet the number of successful attacks is in the rise. In this review paper, previous researches will be examined, various kinds of attacks will be analyzed, results will be compared and loopholes/ drawbacks will be discussed.
引用
收藏
页码:98 / 102
页数:5
相关论文
共 21 条
[1]   A Secure and Practical Authentication Scheme Using Personal Devices [J].
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Alrawais, Arwa ;
Song, Tianyi ;
Cheng, Xiuzhen ;
Chen, Dechang .
IEEE ACCESS, 2017, 5 :11677-11687
[2]  
Bakar Khaiml Azmi Abu, 2013, COMP INF TECHN WCCIT
[3]  
Barber Randal, 2016, ELEGANT HARDWARE MAL
[4]   Mobile Authentication Secure Against Man-In-The-Middle Attacks [J].
Bicakci, Kemal ;
Unal, Devrim ;
Ascioglu, Nadir ;
Adalier, Oktay .
9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 :323-329
[5]  
Bmni Alessandro, 2016, UB INT COMP ADV TRUS
[6]  
Borders Kevin, 2005, SEC STOR WORKSH 2005
[7]  
Chen Z., 2008, WIR COMM NETW MOB CO
[8]   A Security and Efficiency Authentication Scheme Based on Human-memorable Password [J].
Cui, Jianming ;
Zhang, Xiaojun ;
Gao, Jianxin ;
Cao, Ning .
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, :293-296
[9]  
Daniel Hein, 2015, TRUSTCOM BIGDATASE I, V1
[10]  
Ichikawa Minor, 2016, ADV INF NETW APPL WO