[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

User perspective and security of a new mobile authentication method

Published: 01 November 2018 Publication History

Abstract

This paper describes a new mobile authentication method which is based on an Open ID Connect standard and subscriber identity module card. The proposed solution enables users to access websites, services and applications without the need to remember passwords, responses or support of any equipment. The proposed method is evaluated from the users' perspective as well as from the security viewpoint. Moreover, we compare it with the two most popular existing authentication schemes i.e. static passwords and SMS OTP (one time password). In order to evaluate user's view on various authentication methods a questionnaire was prepared and distributed among 40 participants. Obtained results revealed that the new authentication scheme yielded better results than the existing methods. Finally, we also performed a security analysis with respect to all abovementioned authentication solutions to assess whether there are any major risks related to the proposed method.

References

[1]
https://www.statista.com. Statista {Online}. Available: https://www.statista.com/topics/2476/online-privacy/. Accessed February 5, 2017.
[2]
Kafle, V. P., Fukushima, Y., Fujikawa, K., & Harai, H. (2016). ID-based communication framework in future networks. Wireless Personal Communications, 86(4), 1735---1750.
[3]
Thamizhchelvy, K., & Geetha, G. (2012). E-banking security: Mitigating online threats using message authentication image (MAI) algorithm. In International conference on computing sciences (ICCS), 2012, Phagwara.
[4]
Veeraraghavan, P., Almuairfi, S., & Chilamkurti, N. (2016). Anonymous paperless secure payment system using clouds. The Journal of Supercomputing, 72(5), 1813---1824.
[5]
Kim, N. H., Lee, Y. S., Lim, H., Jo, H., & Lee, H. J. (2010). Online banking authentication system using mobile-OTP with QR-code. In 5th international conference on computer sciences and convergence information technology (ICCIT), 2010, Seoul.
[6]
Fang, X., & Zhan, J. (2010). Online banking authentication using mobile phones. In 5th international conference on future information technology (FutureTech 2010), Busan.
[7]
Kerttula, E. (2015). A novel federated strong mobile signature service--The finnish case. Journal of Network and Computer Applications, 56, 101---114.
[8]
Fernandez-Saavedra, B., Sanchez-Reillo, R., Ros-Gomez, R., & Liu-Jimenez, J. (2016). Small fingerprint scanners used in mobile devices: The impact on biometric performance. IET Biometrics, 5(1), 28---36.
[9]
Zareen, F. J., & Jabin, S. (2016). Authentic mobile-biometric signature verification system. IET Biometrics, 5(1), 13---19.
[10]
Choi, H.-S., Lee, B., & Yoon, S. (2016). Biometric authentication using noisy electrocardiograms acquired by mobile sensors. IEEE Access, 4, 1266---1273.
[11]
Liu, H., & Lazkani, E. E. (2016). Biometric inspired mobile network authentication and protocol validation. Mobile Networks and Applications, 21(1), 130---138.
[12]
Ghouzali, S., Lafkih, M., Abdul, W., Mikram, M., El Haziti, Mohammed, & Aboutajdine, D. (2016). Trace attack against biometric mobile applications. Mobile Information Systems, 2016, 1---15.
[13]
Torres, J., Izquierdo, A., & Sierra, J. M. (2007). Advances in network smart cards authentication. Computer Networks, 51(9), 2249---2261.
[14]
Ashraf, M., Aziz, S. M., & Kabir, M. L. (2009). A SIM-based electronic transaction authentication system. Computer Systems Science and Engineering, 24, 13---20.
[15]
Parka, H.-S., Leeb, H.-W., Leec, D. H., & Koa, H.-K. (2008). Multi-protocol authentication for SIP/SS7 mobile network. Computer Communications, 31(11), 2755---2763.
[16]
Mishra, D., Das, A. K., & Mukhopadhyay, S. (2016). A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Networking and Applications, 9(1), 171---192.
[17]
Islam, S. H., Obaidat, M. S., & Amin, R. (2016). An anonymous and provably secure authentication scheme for mobile user. International Journal of Communication Systems, 29, 1529---1544.
[18]
Djellali, B., Belarbi, K., Chouarfia, A., & Lorenz, P. (2015). User authentication scheme preserving anonymity for ubiquitous devices. Security and Communication Networks, 8(17), 3131---3141.
[19]
Gope, P., & Hwang, T. (2016). An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. Journal of Network and Computer Applications, 62, 1---8.
[20]
Tsai, J.-L., & Lo, N.-W. (2016). Provably secure anonymous authentication with batch verification for mobile roaming services. Ad Hoc Networks, 44, 19---31.
[21]
Lu, Y., Li, L., Peng, H., & Yang, Y. (2016). Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment. Security and Communication Networks, 9(11), 1331---1339.
[22]
Alizadeha, M., Abolfazlic, S., Zamanid, M., Baharunb, S., & Sakuraia, K. (2016). Authentication in mobile cloud computing: A survey. Journal of Network and Computer Applications, 61, 59---80.
[23]
Yanga, X., Huanga, X., & Liu, J. K. (2016). Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing. Future Generation Computer Systems, 62, 190---195.
[24]
Mayrhofer, R. (2014). An architecture for secure mobile devices. Security and Communication Networks, 8, 1958---1970.
[25]
Bicakcia, K., Unalb, D., Asciogluc, N., & Adalierc, O. (2014). Mobile authentication secure against man-in-the-middle attacks. Procedia Computer Science, 34, 323---329.
[26]
Abid, M. H., Jan, F., Mustafa, T., & Faridi, M. S. (2012). Cloud computing: A general user's perceptions and security issues at Universities of Faisalabad, Pakistan. International Journal of Computer Science Issues, 9(5), 375---380.
[27]
Weir, C. S., Douglas, G., Carruthers, M., & Jack, M. (2009). User perceptions of security, convenience and usability. Computers and Security, 28(1---2), 47---62.
[28]
Sari, P. K., Ratnasari, G. S., & Prasetio, A. (2015). An evaluation of authentication methods for smartphone based on users' preferences. In International conference on innovation in engineering and vocational education, Bandung.
[29]
http://openid.net/ {Online}. Available: http://openid.net/specs/openid-connect-core-1_0.html. Accessed 2017.
[30]
Hardt, D. (2012). https://tools.ietf.org/html/rfc6749. Internet Engineering Task Force (IETF), October 2012. {Online}. Available: https://tools.ietf.org/html/rfc6749. Accessed February 5, 2017.
[31]
http://www.simplypsychology.org {Online}. Available: http://www.simplypsychology.org/likert-scale.html. Accessed 2017.
[32]
https://www.owasp.org. OWASP {Online}. Available: https://www.owasp.org/index.php/HttpOnly. Accessed 2017.
[33]
https://www.owasp.org. OWASP {Online}. Available: https://www.owasp.org/index.php/Clickjacking_Defense_Cheat_Sheet. Accessed 2017.

Cited By

View all
  • (2024)TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High AccuracyIEEE Transactions on Mobile Computing10.1109/TMC.2023.326507123:4(2832-2848)Online publication date: 1-Apr-2024
  • (2022)A robust packet‐dropping covert channel for mobile intelligent terminalsInternational Journal of Intelligent Systems10.1002/int.2286837:10(6928-6950)Online publication date: 25-Aug-2022
  • (2021)The Annoying, the Disturbing, and the Weird: Challenges with Phone Numbers as Identifiers and Phone Number RecyclingProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445085(1-14)Online publication date: 6-May-2021
  • Show More Cited By
  1. User perspective and security of a new mobile authentication method

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Telecommunications Systems
      Telecommunications Systems  Volume 69, Issue 3
      November 2018
      142 pages

      Publisher

      Kluwer Academic Publishers

      United States

      Publication History

      Published: 01 November 2018

      Author Tags

      1. Authentication convenience
      2. Security
      3. Smart cards
      4. User experience

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High AccuracyIEEE Transactions on Mobile Computing10.1109/TMC.2023.326507123:4(2832-2848)Online publication date: 1-Apr-2024
      • (2022)A robust packet‐dropping covert channel for mobile intelligent terminalsInternational Journal of Intelligent Systems10.1002/int.2286837:10(6928-6950)Online publication date: 25-Aug-2022
      • (2021)The Annoying, the Disturbing, and the Weird: Challenges with Phone Numbers as Identifiers and Phone Number RecyclingProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445085(1-14)Online publication date: 6-May-2021
      • (2019)An empirical study of SMS one-time password authentication in Android appsProceedings of the 35th Annual Computer Security Applications Conference10.1145/3359789.3359828(339-354)Online publication date: 9-Dec-2019

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media