A Secure and Practical Authentication Scheme Using Personal Devices

被引:17
作者
Alhothaily, Abdulrahman [1 ,2 ]
Hu, Chunqiang [1 ,3 ]
Alrawais, Arwa [1 ,4 ]
Song, Tianyi [1 ]
Cheng, Xiuzhen [1 ]
Chen, Dechang [5 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[2] Saudi Arabian Monetary Author, Gen Dept Payment Syst, Riyadh 11169, Saudi Arabia
[3] Chongqing Univ, Sch Software Engn, Chongqing 400044, Peoples R China
[4] Prince Sattam bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
[5] Uniformed Serv Univ Hlth Sci, Dept Prevent Med & Biostat, Bethesda, MD 20814 USA
基金
美国国家科学基金会;
关键词
Security; authentication; one-time username; access control;
D O I
10.1109/ACCESS.2017.2717862
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication plays a critical role in securing any online banking system, and many banks and various services have long relied on username/password combos to verify users. Memorizing usernames and passwords for a lot of accounts becomes a cumbersome and inefficient task. Furthermore, legacy authentication methods have failed over and over, and they are not immune against a wide variety of attacks that can be launched against users, networks, or authentication servers. Over the years, data breach reports emphasize that attackers have created numerous high-tech techniques to steal users' credentials, which can pose a serious threat. In this paper, we propose an efficient and practical user authentication scheme using personal devices that utilize different cryptographic primitives, such as encryption, digital signature, and hashing. The technique benefits from the widespread usage of ubiquitous computing and various intelligent portable and wearable devices that can enable users to execute a secure authentication protocol. Our proposed scheme does not require an authentication server to maintain static username and password tables for identifying and verifying the legitimacy of the login users. It not only is secure against password-related attacks, but also can resist replay attacks, shoulder-surfing attacks, phishing attacks, and data breach incidents.
引用
收藏
页码:11677 / 11687
页数:11
相关论文
共 39 条
[1]   A novel verification method for payment card systems [J].
Alhothaily, Abdulrahman ;
Alrawais, Arwa ;
Cheng, Xiuzhen ;
Bie, Rongfang .
PERSONAL AND UBIQUITOUS COMPUTING, 2015, 19 (07) :1145-1156
[2]  
Alhothaily A, 2014, LECT NOTES COMPUT SC, V8491, P356, DOI 10.1007/978-3-319-07782-6_33
[3]   An Attribute-Based Encryption Scheme to Secure Fog Communications [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Xing, Xiaoshuang ;
Cheng, Xiuzhen .
IEEE ACCESS, 2017, 5 :9131-9138
[4]  
Alrawais A, 2014, LECT NOTES COMPUT SC, V8491, P554, DOI 10.1007/978-3-319-07782-6_50
[5]  
[Anonymous], 2014, VER DAT BREACH INV R
[6]  
[Anonymous], 2011, PIN SEC REQ
[7]  
[Anonymous], 2015, TELESIGN CONSUMER AC
[8]  
[Anonymous], J PRIVACY CONFIDENTI
[9]  
[Anonymous], 2010, P 5 INT C FUT INF TE
[10]  
[Anonymous], 2006, ACM CCS 2006