Comparing passwords, tokens, and biometrics for user atithentication

被引:339
作者
O'Gorman, L [1 ]
机构
[1] Avaya Labs, Basking Ridge, NJ 07920 USA
关键词
access control; biometric; end-user authentication; human authentication; identity management; identity token; password; verification;
D O I
10.1109/JPROC.2003.819611
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
For decades, the password has been the standard means for user authentication on computers. However as users are required to remember more, longer and changing passwords, it is evident that a more convenient and secure solution to user authentication is necessary. This paper examines passwords, security tokens, and biometrics-which we collectively call authenticators-and compares these authenticators and their combinations. We examine their effectiveness against several attacks and suitability for particular security specifications such as compromise detection and nonrepudiation. Examples of authenticator combinations and protocols are described to show tradeoffs and solutions that meet chosen, practical requirements. The paper endeavors to offer a comprehensive picture of user authentication solutions for the purposes of evaluating options for use and identifying deficiencies requiring further research.
引用
收藏
页码:2021 / 2040
页数:20
相关论文
共 56 条
[1]  
ANDERSON R, 1921, SECURITY ENG, P384
[2]  
[Anonymous], 2002, CRYPTOGRAPHY THEORY
[3]  
[Anonymous], FRVT 2000 EVALUATION
[4]  
[Anonymous], 2002, Oxford English Dictionary Online
[5]  
[Anonymous], 2001, SPECIFICATION ADV EN
[6]  
[Anonymous], 2000, SSL TLS DESIGNING BU
[7]  
[Anonymous], 1998, EAR BIOMETRICS BIOME
[8]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[9]   IMPROVING SYSTEM SECURITY VIA PROACTIVE PASSWORD CHECKING [J].
BISHOP, M ;
KLEIN, DV .
COMPUTERS & SECURITY, 1995, 14 (03) :233-249
[10]  
BLACK UD, 2000, INTERNET SECURITY PR, P113