A Theoretical Proposal of Two-Factor Authentication in Smartphones
Context. For a user to gain access to a protected resource on the web,the user needs to get authenticated. There are different forms of authenti-cation, among the most common is the ordinary user name and passwordscheme. This scheme is very simple to implement, but it suffers from se-curity vulnerab...
Main Authors: | , |
---|---|
Format: | Others |
Language: | English |
Published: |
Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik
2017
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14691 |
id |
ndltd-UPSALLA1-oai-DiVA.org-bth-14691 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-bth-146912018-01-14T05:11:35ZA Theoretical Proposal of Two-Factor Authentication in SmartphonesengPersson, OskarWermelin, ErikBlekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknikBlekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik2017Two-factor authenticationsmartphonefingerprint authenticationComputer SciencesDatavetenskap (datalogi)Context. For a user to gain access to a protected resource on the web,the user needs to get authenticated. There are different forms of authenti-cation, among the most common is the ordinary user name and passwordscheme. This scheme is very simple to implement, but it suffers from se-curity vulnerabilities and requires the user to remember passwords to allaccounts. Two-factor authentication could be one answer to increase thesecurity where one-factor authentication is lacking. However, depending onthe implementation, two-factor authentication could still be insecure andeven more user-unfriendly. Objectives. In this study, we investigate if our implementation of two-factor authentication has any advantages to existing ones. Our goal is topresent a secure and user-friendly authentication scheme that uses bothpassword and fingerprint. Methods. A literary study was performed in order to collect informationon similar systems and subjects in order to build a comparable authentica-tion model. The collected information and proposed model was then usedto analyze possible drawbacks and to answer research questions. Results. Results derive from the comparison between our proposed modeland two Google two-factor authentication solutions. Conclusions. The results yielded from the literary study and analysisshows that our proposed model does not add any advantages concerningsecurity. Our model does however provide better ease of use in comparisonwith similar two-factor authentication solutions from Google. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:bth-14691application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Two-factor authentication smartphone fingerprint authentication Computer Sciences Datavetenskap (datalogi) |
spellingShingle |
Two-factor authentication smartphone fingerprint authentication Computer Sciences Datavetenskap (datalogi) Persson, Oskar Wermelin, Erik A Theoretical Proposal of Two-Factor Authentication in Smartphones |
description |
Context. For a user to gain access to a protected resource on the web,the user needs to get authenticated. There are different forms of authenti-cation, among the most common is the ordinary user name and passwordscheme. This scheme is very simple to implement, but it suffers from se-curity vulnerabilities and requires the user to remember passwords to allaccounts. Two-factor authentication could be one answer to increase thesecurity where one-factor authentication is lacking. However, depending onthe implementation, two-factor authentication could still be insecure andeven more user-unfriendly. Objectives. In this study, we investigate if our implementation of two-factor authentication has any advantages to existing ones. Our goal is topresent a secure and user-friendly authentication scheme that uses bothpassword and fingerprint. Methods. A literary study was performed in order to collect informationon similar systems and subjects in order to build a comparable authentica-tion model. The collected information and proposed model was then usedto analyze possible drawbacks and to answer research questions. Results. Results derive from the comparison between our proposed modeland two Google two-factor authentication solutions. Conclusions. The results yielded from the literary study and analysisshows that our proposed model does not add any advantages concerningsecurity. Our model does however provide better ease of use in comparisonwith similar two-factor authentication solutions from Google. |
author |
Persson, Oskar Wermelin, Erik |
author_facet |
Persson, Oskar Wermelin, Erik |
author_sort |
Persson, Oskar |
title |
A Theoretical Proposal of Two-Factor Authentication in Smartphones |
title_short |
A Theoretical Proposal of Two-Factor Authentication in Smartphones |
title_full |
A Theoretical Proposal of Two-Factor Authentication in Smartphones |
title_fullStr |
A Theoretical Proposal of Two-Factor Authentication in Smartphones |
title_full_unstemmed |
A Theoretical Proposal of Two-Factor Authentication in Smartphones |
title_sort |
theoretical proposal of two-factor authentication in smartphones |
publisher |
Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik |
publishDate |
2017 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14691 |
work_keys_str_mv |
AT perssonoskar atheoreticalproposaloftwofactorauthenticationinsmartphones AT wermelinerik atheoreticalproposaloftwofactorauthenticationinsmartphones AT perssonoskar theoreticalproposaloftwofactorauthenticationinsmartphones AT wermelinerik theoreticalproposaloftwofactorauthenticationinsmartphones |
_version_ |
1718609607720435712 |