Inicio  /  Information  /  Vol: 14 Par: 7 (2023)  /  Artículo
ARTÍCULO
TITULO

A Novel Authentication Method That Combines Honeytokens and Google Authenticator

Vassilis Papaspirou    
Maria Papathanasaki    
Leandros Maglaras    
Ioanna Kantzavelou    
Christos Douligeris    
Mohamed Amine Ferrag and Helge Janicke    

Resumen

Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. To address this, this study proposes a new two-factor authentication method that uses honeytokens. Honeytokens and Google Authenticator are combined to create a stronger authentication process. The proposed approach aims to provide additional layers of security and protection to computer systems, increasing their overall security beyond what is currently provided by single-password or standard two-factor authentication methods. The key difference is that the proposed system resembles a two-factor authentication but, in reality, works like a multi-factor authentication system. Multi-factor authentication (MFA) is a security technique that verifies a user?s identity by requiring multiple credentials from distinct categories. These typically include knowledge factors (something the user knows, such as a password or PIN), possession factors (something the user has, such as a mobile phone or security token), and inherence factors (something the user is, such as a biometric characteristic like a fingerprint). This multi-tiered approach significantly enhances protection against potential attacks. We examined and evaluated our system?s robustness against various types of attacks. From the user?s side, the system is as friendly as a two-factor authentication method with an authenticator and is more secure.

 Artículos similares

       
 
Yaser Ali Enaya,Mohammed Jawad Mohammed,Ghassan Abdulhussein Bilal     Pág. pp. 163 - 179
This study introduces a novel authentication methodology; it is based on pattern recognition of fingers size and pressure when users touch smartphone screen. By analyzing diagrams of these touches and applying data mining for the first time as an authent... ver más

 
Smruti Chourasia,Hrishikesh Bharadwaj Chakrapani,Queenie Das,Krati Agarwal,Lavanya K    
The communication boom in the past few decades has resulted in a large flow of data. This entails the need for having high security and privacy with regards to data confidentiality and authenticity. One method of doing so is by utilizing a synchronized k... ver más

 
Krzysztof Golofit and Piotr Z. Wieczorek    
The concept presented in this paper fits into the current trend of highly secured hardware authentication designs utilizing Physically Unclonable Functions (PUFs) or Physical Obfuscated Keys (POKs). We propose an idea that the PUF cryptographic keys can ... ver más
Revista: Applied Sciences

 
Mrinmoy Sarkar, Dhiman Chowdhury, Celia Shahnaz and Shaikh Anowarul Fattah    
Electrical network frequency (ENF) is a signature of a power distribution grid. It represents the deviation from the nominal frequency (50 or 60 Hz) of a power system network. The variations in ENF sequences within a grid are subject to load fluctuations... ver más
Revista: Applied Sciences

 
Pavani V L     Pág. pp. 4 - 19
The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The percep... ver más