CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Ranking of Authentication Schemes based on Critical Limiting Factors

by Sangeeth Kumar. S, R. Venkatesan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 92 - Number 7
Year of Publication: 2014
Authors: Sangeeth Kumar. S, R. Venkatesan
10.5120/16024-5066

Sangeeth Kumar. S, R. Venkatesan . Ranking of Authentication Schemes based on Critical Limiting Factors. International Journal of Computer Applications. 92, 7 ( April 2014), 34-40. DOI=10.5120/16024-5066

@article{ 10.5120/16024-5066,
author = { Sangeeth Kumar. S, R. Venkatesan },
title = { Ranking of Authentication Schemes based on Critical Limiting Factors },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 92 },
number = { 7 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume92/number7/16024-5066/ },
doi = { 10.5120/16024-5066 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:13:42.348698+05:30
%A Sangeeth Kumar. S
%A R. Venkatesan
%T Ranking of Authentication Schemes based on Critical Limiting Factors
%J International Journal of Computer Applications
%@ 0975-8887
%V 92
%N 7
%P 34-40
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In any of the computing environment ranging from a traditional computing to the emerging service based computing, security and privacy has been an important consideration in the architecture. Particularly user authentication is an entry point to almost each and every application and services published. Extensive research work in user authentication has yielded several authentication schemes but the existing schemes focuses largely on the benefits rather than their downside in terms of security, usability and deploying ability, which are found to be ineffective when deployed in the real world. To overcome this issue, a ranking model is proposed in this paper that analyzes the authentication scheme based on their limitations and gives a prioritized scheme based on which the best mechanism at a particular instance of time could be chosen and implemented.

References
  1. Weaknesses and Improvements of a One-time Password Authentication Scheme Mijin Kim, Byunghee Lee, Seungjoo Kim, and Dongho Won, International Journal of Future Generation Communication and Networking Vol. 2, No. 4, December, 2009.
  2. oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks Hung-Min Sun, Yao-Hsin Chen, and Yue-Hsun Lin. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012 651
  3. Using Geographical Location as an Authentication Factor to Enhance mCommerce Applications on Smartphones, Torben Kuseler & Ihsan Alshahib Lami,International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (4) : 2012
  4. D´ej`aVu: A User Study Using Images for Authentication_, Rachna Dhamija, SIMS / CS, University of California Berkeley
  5. Comparing Passwords, Tokens, and Biometrics for User Authentication Lawrence O'Gorman Avaya Labs, Basking Ridge, NJ, USA, Proceedings of the IEEE, Vol. 91, No. 12, Dec. 2003, pp. 2019-2040 ã 2003 IEEE.
  6. J. Goldberg, J. Hagman, and V. Sazawal. Doodling our way to better authentication. In Proc. of Ext. Abstracts CHI 2002, pages 868{869, New York, NY, USA, 2002. ACM Press.
  7. B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell. Stronger password authentication using browser extensions. 14th Usenix Security Symposium, page 1732, 2005.
  8. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, Cormac Herley, Microsoft Research, Redmond, WA, USA.
  9. Computationally Efficient PKI-Based Single Sign-On Protocol PKASSO for Mobile Devices Ki-Woong Park, Student Member, IEEE, Sang Seok Lim, Member, IEEE, and Kyu Ho Park, Member,IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 6, JUNE 2008
  10. J. Yan, A. Blackwell, R. Anderson, and A. Grant. Password memorability and security: Empirical results. IEEE Security and Privacy, 2(5):25{31, 2004.
  11. Password Management Strategies for Online Accounts, Shirley Gaw, Symposium On Usable Privacy and Security (SOUPS) 2006, July 1214, 2006, Pittsburgh, PA, USA.
  12. Revisiting Defenses against Large-Scale Online Password Guessing Attacks Mansour Alsaleh, Mohammad Mannan, and P. C. van Oorschot, Member, IEEE. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 1, JANUARY/FEBRUARY 2012
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Schemes Critical limiting factor Survey Impact Factor Value.