Authentication Token as SSO Devices

Abstract

Authentication is a process by which a person verifies that someone is who he claims he is. There are many ways of authentication as user login authentication, one-way authentication of communicating entities and two-way authentication. User login authentication uses password based mechanism like keeping password secret. There is a mechanism single sign on service which uses password based mechanism. We proposed a design of authentication token as single sign on (SSO) devices to provide a Secure and reliable authentication with increasing of acceptability. The single sign-on service provides the multi-logins possible but less comfortable in use and requires the passwords for login. Passwordbased mechanisms dominate as they are easy to use frequent and do not need additional hardware. However, lots of users do not realize the threads with respect to password-based mechanism like repeatedly use the same password, sophisticated attacks like repudiation, traffic analysis, snooping, replaying etc. and hacks. Mechanisms based on two-factor authentication using Onetime Passwords, crypto-token may solve these security problems but because of complexity it is less comfortable in usage. In order to raise user acceptance of these methods we combine the idea of two-factor authentication with single sign-on service for local and remote authentication. This combined approach leads to a win-win-situation: token-based authentication reduces the risk of stolen authentication factors and stops the attacks and reduces the hacks as the tokens are protected against misuse by a secret pin and it does not need much more user effort than password-based mechanisms and the multi-logins are also possible as we are using the Single Sign-On service. The proposed system will consist of an authentication token i.e. crypto-token with single sign-on service.

Authors and Affiliations

Praveen Kumar Maheshwari, Ajay Palmure, Bharati S. Ainapure

Keywords

Related Articles

Minimizing Network Overhead In MANET Using Elliptic Curve Cryptography

In this paper, we propose and implement a new intrusion-detection system with ECC Algorithm specially designed for MANETs. The self-configuring ability of nodes in MANET made it popular among critical mission applica...

A New Approach to Increase the Efficiency of Classical Approach In Designing Management Information Systems (MIS’S)

Classical approach is one of information systems methodologies that are used to design and build the management information systems (MIS’s), it always uses the all five stages in its life cycle during the design of (...

Filtered Wall: An Automated System to Filter Unwanted Messages from OSN User Profiles

In recent years, Online Social Networks (OSNs) have become an important part of daily life. Users build explicit networks to represent their social relationships. Users can upload and share information related to the...

Highly Secured High Throughput Efficient VLSI Architecture for AES Implementations

The AES algorithm can be implemented in different styles at programming levels. The paper compares the hardware efficiency of different AES implementations with respect to their area, speed and power performance espec...

Analysis of a SIMO transceiver system for Rayleigh fading environment with maximal ratio combining

To achieve the desired goal of increasing the SNR and reducing BER in wireless communication, it is required to mitigate fading of signal during transmission. If more than one antenna is used for transmission and rece...

Download PDF file
  • EP ID EP27852
  • DOI -
  • Views 273
  • Downloads 0

How To Cite

Praveen Kumar Maheshwari, Ajay Palmure, Bharati S. Ainapure (2014). Authentication Token as SSO Devices. International Journal of Research in Computer and Communication Technology, 3(3), -. https://europub.co.uk/articles/-A-27852