Back to Search Start Over

Mitigating Vulnerabilities in 3-Factor based Authentication

Authors :
Irfan Siddavatam
Yogita Borse
Source :
International Journal of Computer Applications. 76:19-23
Publication Year :
2013
Publisher :
Foundation of Computer Science, 2013.

Abstract

Remote user authentication schemes are use to identify a user in the distributed environment. There are three different factors commonly use for authentication purpose named as password, smart card and biometric. It is been observed that authentication protocols designed till date are based on password. Normally, password is used as a first authentication factor, where as other two factors are included according to the level of security requirements. In this paper, analysis of 3-factor based protocols is done on the basis of wrong password input and stolen smart card vulnerabilities. Paper also suggest the improvements to control these vulnerabilities.

Details

ISSN :
09758887
Volume :
76
Database :
OpenAIRE
Journal :
International Journal of Computer Applications
Accession number :
edsair.doi...........8b884a546dcff2ee9b3929e58371addb