Authentication Token as SSO Devices

Abstract

Authentication is a process by which a person verifies that someone is who he claims he is. There are many ways of authentication as user login authentication, one-way authentication of communicating entities and two-way authentication. User login authentication uses password based mechanism like keeping password secret. There is a mechanism single sign on service which uses password based mechanism. We proposed a design of authentication token as single sign on (SSO) devices to provide a Secure and reliable authentication with increasing of acceptability. The single sign-on service provides the multi-logins possible but less comfortable in use and requires the passwords for login. Passwordbased mechanisms dominate as they are easy to use frequent and do not need additional hardware. However, lots of users do not realize the threads with respect to password-based mechanism like repeatedly use the same password, sophisticated attacks like repudiation, traffic analysis, snooping, replaying etc. and hacks. Mechanisms based on two-factor authentication using Onetime Passwords, crypto-token may solve these security problems but because of complexity it is less comfortable in usage. In order to raise user acceptance of these methods we combine the idea of two-factor authentication with single sign-on service for local and remote authentication. This combined approach leads to a win-win-situation: token-based authentication reduces the risk of stolen authentication factors and stops the attacks and reduces the hacks as the tokens are protected against misuse by a secret pin and it does not need much more user effort than password-based mechanisms and the multi-logins are also possible as we are using the Single Sign-On service. The proposed system will consist of an authentication token i.e. crypto-token with single sign-on service.

Authors and Affiliations

Praveen Kumar Maheshwari, Ajay Palmure, Bharati S. Ainapure

Keywords

Related Articles

Three-Party Authenticated Quantum Key Distribution Protocols based Security in WLANs

This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with i...

Investigation on Effect of Height over an Antenna Performance

The antenna is the most essential element in every communication system. Radiation pattern is the most important specification to be considered while designing an antenna. It is evident that the shape of the radiation...

Self-motivated probe forms designed for database Uncertainties

Query form is a standout amongst the most broadly utilized client interfaces for questioning databases. Conventional inquiry structures are planned and precharacterized by engineers or DBA in different data administra...

Home Based Optimistic Addressing In MSN

Mobile social networks (MSNs) are a kind of delay tolerant network that consists of lots of mobile nodes with social characteristics. Recently, many socialaware algorithms have been proposed to address routing problem...

Principled Probabilistic Methods To Integrate Information From The Query Workload Into The Data Annotation Process

The aspiration of CADS is to persuade and inferior the cost of crafting adequately interpreted documents that can be right away helpful for usually issued partially prearranged enquiries. Our solution ambition is to...

Download PDF file
  • EP ID EP27852
  • DOI -
  • Views 266
  • Downloads 0

How To Cite

Praveen Kumar Maheshwari, Ajay Palmure, Bharati S. Ainapure (2014). Authentication Token as SSO Devices. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27852