A Theoretical Proposal of Two-Factor Authentication in Smartphones

Context. For a user to gain access to a protected resource on the web,the user needs to get authenticated. There are different forms of authenti-cation, among the most common is the ordinary user name and passwordscheme. This scheme is very simple to implement, but it suffers from se-curity vulnerab...

Full description

Bibliographic Details
Main Authors: Persson, Oskar, Wermelin, Erik
Format: Others
Language:English
Published: Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik 2017
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14691
id ndltd-UPSALLA1-oai-DiVA.org-bth-14691
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-bth-146912018-01-14T05:11:35ZA Theoretical Proposal of Two-Factor Authentication in SmartphonesengPersson, OskarWermelin, ErikBlekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknikBlekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik2017Two-factor authenticationsmartphonefingerprint authenticationComputer SciencesDatavetenskap (datalogi)Context. For a user to gain access to a protected resource on the web,the user needs to get authenticated. There are different forms of authenti-cation, among the most common is the ordinary user name and passwordscheme. This scheme is very simple to implement, but it suffers from se-curity vulnerabilities and requires the user to remember passwords to allaccounts. Two-factor authentication could be one answer to increase thesecurity where one-factor authentication is lacking. However, depending onthe implementation, two-factor authentication could still be insecure andeven more user-unfriendly. Objectives.  In this study, we investigate if our implementation of two-factor authentication has any advantages to existing ones. Our goal is topresent a secure and user-friendly authentication scheme that uses bothpassword and fingerprint. Methods. A literary study was performed in order to collect informationon similar systems and subjects in order to build a comparable authentica-tion model. The collected information and proposed model was then usedto analyze possible drawbacks and to answer research questions. Results. Results derive from the comparison between our proposed modeland two Google two-factor authentication solutions. Conclusions. The results yielded from the literary study and analysisshows that our proposed model does not add any advantages concerningsecurity. Our model does however provide better ease of use in comparisonwith similar two-factor authentication solutions from Google. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:bth-14691application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic Two-factor authentication
smartphone
fingerprint authentication
Computer Sciences
Datavetenskap (datalogi)
spellingShingle Two-factor authentication
smartphone
fingerprint authentication
Computer Sciences
Datavetenskap (datalogi)
Persson, Oskar
Wermelin, Erik
A Theoretical Proposal of Two-Factor Authentication in Smartphones
description Context. For a user to gain access to a protected resource on the web,the user needs to get authenticated. There are different forms of authenti-cation, among the most common is the ordinary user name and passwordscheme. This scheme is very simple to implement, but it suffers from se-curity vulnerabilities and requires the user to remember passwords to allaccounts. Two-factor authentication could be one answer to increase thesecurity where one-factor authentication is lacking. However, depending onthe implementation, two-factor authentication could still be insecure andeven more user-unfriendly. Objectives.  In this study, we investigate if our implementation of two-factor authentication has any advantages to existing ones. Our goal is topresent a secure and user-friendly authentication scheme that uses bothpassword and fingerprint. Methods. A literary study was performed in order to collect informationon similar systems and subjects in order to build a comparable authentica-tion model. The collected information and proposed model was then usedto analyze possible drawbacks and to answer research questions. Results. Results derive from the comparison between our proposed modeland two Google two-factor authentication solutions. Conclusions. The results yielded from the literary study and analysisshows that our proposed model does not add any advantages concerningsecurity. Our model does however provide better ease of use in comparisonwith similar two-factor authentication solutions from Google.
author Persson, Oskar
Wermelin, Erik
author_facet Persson, Oskar
Wermelin, Erik
author_sort Persson, Oskar
title A Theoretical Proposal of Two-Factor Authentication in Smartphones
title_short A Theoretical Proposal of Two-Factor Authentication in Smartphones
title_full A Theoretical Proposal of Two-Factor Authentication in Smartphones
title_fullStr A Theoretical Proposal of Two-Factor Authentication in Smartphones
title_full_unstemmed A Theoretical Proposal of Two-Factor Authentication in Smartphones
title_sort theoretical proposal of two-factor authentication in smartphones
publisher Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik
publishDate 2017
url http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14691
work_keys_str_mv AT perssonoskar atheoreticalproposaloftwofactorauthenticationinsmartphones
AT wermelinerik atheoreticalproposaloftwofactorauthenticationinsmartphones
AT perssonoskar theoreticalproposaloftwofactorauthenticationinsmartphones
AT wermelinerik theoreticalproposaloftwofactorauthenticationinsmartphones
_version_ 1718609607720435712