Authentication Token as SSO Devices
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Authentication is a process by which a person verifies that someone is who he claims he is. There are many ways of authentication as user login authentication, one-way authentication of communicating entities and two-way authentication. User login authentication uses password based mechanism like keeping password secret. There is a mechanism single sign on service which uses password based mechanism. We proposed a design of authentication token as single sign on (SSO) devices to provide a Secure and reliable authentication with increasing of acceptability. The single sign-on service provides the multi-logins possible but less comfortable in use and requires the passwords for login. Passwordbased mechanisms dominate as they are easy to use frequent and do not need additional hardware. However, lots of users do not realize the threads with respect to password-based mechanism like repeatedly use the same password, sophisticated attacks like repudiation, traffic analysis, snooping, replaying etc. and hacks. Mechanisms based on two-factor authentication using Onetime Passwords, crypto-token may solve these security problems but because of complexity it is less comfortable in usage. In order to raise user acceptance of these methods we combine the idea of two-factor authentication with single sign-on service for local and remote authentication. This combined approach leads to a win-win-situation: token-based authentication reduces the risk of stolen authentication factors and stops the attacks and reduces the hacks as the tokens are protected against misuse by a secret pin and it does not need much more user effort than password-based mechanisms and the multi-logins are also possible as we are using the Single Sign-On service. The proposed system will consist of an authentication token i.e. crypto-token with single sign-on service.
Authors and Affiliations
Praveen Kumar Maheshwari, Ajay Palmure, Bharati S. Ainapure
Performance of Patch Antenna In Air And Fresh Water
This paper examines the performance of a Microstrip fed rectangular patch antenna in air and water. Antennas are designed and simulated with the help of HFSS (High Frequency Structure Simulator) software. The antenna w...
The Safety Framework in Network Security utilizing Cryptographic Systems
Remote Sensor Networks comprise of independent sensor hubs appended to one or more base stations.As Wireless sensor systems proceed to grow, they get to be helpless against assaults and subsequently the requirement f...
Analysis of Rabin and RSA Cryptosystems Using Bit Shifting and Stuffing (BSS) Technique
The important categories of network security application are to reduce the transmitted data size and to improve the security of the data. Compression of data before the transmission can reduce network transmission ti...
http://www.ijrcct.org/index.php/ojs/article/download/1190/pdf
In recent years, cloud computing has been adopted by large sphere of public and private organizations due to its streamline processes, reduced capital, improved flexibility and accessibility, and resource sharing abi...
A New Dynamic Privacy Grid Mechanism for Location Based Services
Appropriate to the nature of the data being swap over between the user and the server, the common changing of the user’s name provides modest shield for the user’s privacy. A more recent investigation of the mix-zone...