Authentication Token as SSO Devices

Abstract

Authentication is a process by which a person verifies that someone is who he claims he is. There are many ways of authentication as user login authentication, one-way authentication of communicating entities and two-way authentication. User login authentication uses password based mechanism like keeping password secret. There is a mechanism single sign on service which uses password based mechanism. We proposed a design of authentication token as single sign on (SSO) devices to provide a Secure and reliable authentication with increasing of acceptability. The single sign-on service provides the multi-logins possible but less comfortable in use and requires the passwords for login. Passwordbased mechanisms dominate as they are easy to use frequent and do not need additional hardware. However, lots of users do not realize the threads with respect to password-based mechanism like repeatedly use the same password, sophisticated attacks like repudiation, traffic analysis, snooping, replaying etc. and hacks. Mechanisms based on two-factor authentication using Onetime Passwords, crypto-token may solve these security problems but because of complexity it is less comfortable in usage. In order to raise user acceptance of these methods we combine the idea of two-factor authentication with single sign-on service for local and remote authentication. This combined approach leads to a win-win-situation: token-based authentication reduces the risk of stolen authentication factors and stops the attacks and reduces the hacks as the tokens are protected against misuse by a secret pin and it does not need much more user effort than password-based mechanisms and the multi-logins are also possible as we are using the Single Sign-On service. The proposed system will consist of an authentication token i.e. crypto-token with single sign-on service.

Authors and Affiliations

Praveen Kumar Maheshwari, Ajay Palmure, Bharati S. Ainapure

Keywords

Related Articles

Edge Detection to Enhance Definite Range Image Segmentation by Clustering Algorithms

Edges of an image are considered a type of crucial information that can be extracted by applying detectors with different methodologies. However, edge detection provides rich information about the scene being observed...

MCLOUD: Effective Data Sharing In Multiple-Groups

Cloud computing is an emerging computing paradigm. It provides an economical and efficient solution for sharing group resource among cloud users. Due to frequent change of members in multi owner group, preserving user...

Analyzing Mel Frequency Cepstral Coefficient for Recognition of Isolated English Word using DTW Matching

In this paper we proposed Mel-frequency cepstrum coefficients feature extraction and Dynamic Time Warping matching algorithm for speech recognition. Feature vector (Mel-frequency cepstrum coefficients) obtained from...

Wavelet Quality Assessment For Mapping Images

To improve the quality of the images which are adaptively fused by various techniques and now representing wavelet fusion scheme to increase the naturalness of the image by using the parameters like SSIM or structura...

An Effective Scheme for Countering Distributed Denial of Service Attacks on Mobile Ad-hoc Networks

Mobile ad hoc networks play a key role in the private and public communication, yet their application is being hampered by network attacks. One of the most dangerous attacks that pose a serious threat to the mobile a...

Download PDF file
  • EP ID EP27852
  • DOI -
  • Views 257
  • Downloads 0

How To Cite

Praveen Kumar Maheshwari, Ajay Palmure, Bharati S. Ainapure (2014). Authentication Token as SSO Devices. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27852