2022
DOI: 10.5772/acrt.08
|View full text |Cite
|
Sign up to set email alerts
|

Modern Authentication Methods: A Comprehensive Survey

Abstract: This paper presents a comprehensive investigation of modern authentication schemes. We start with the importance of authentication methods and the different authentication processes. Then we present the authentication criteria used and we perform a comparison of authentication methods in terms of universality, uniqueness, collectability, performance, acceptability, and spoofing. Finally, we present multi-factor authentication challenges and security issues and present future directions.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…Other solutions, like Private Webmail, Virtu, and Xmail, generate and distribute encryption keys on their servers while concealing the key management process. However, these solutions are paid, and the unavailability of source codes raises trust concerns for end users; Multi-factor authentication (MFA) : MFA offers a robust method of authentication, demanding two or more verification factors to grant access to a resource [ 37 , 38 ]; Trusted Third Parties (TTPs) : Ensuring the secure distribution of public keys to the correct parties can pose significant challenges. The trust placed in the public-key infrastructure (PKI) is of the utmost importance.…”
Section: Related Workmentioning
confidence: 99%
“…Other solutions, like Private Webmail, Virtu, and Xmail, generate and distribute encryption keys on their servers while concealing the key management process. However, these solutions are paid, and the unavailability of source codes raises trust concerns for end users; Multi-factor authentication (MFA) : MFA offers a robust method of authentication, demanding two or more verification factors to grant access to a resource [ 37 , 38 ]; Trusted Third Parties (TTPs) : Ensuring the secure distribution of public keys to the correct parties can pose significant challenges. The trust placed in the public-key infrastructure (PKI) is of the utmost importance.…”
Section: Related Workmentioning
confidence: 99%
“…KBA includes text and picture-based authentication (Bhana & Flowerday, 2020). However, good passwords can sometimes be difficult to remember (Karim et al, 2020;Papathanasaki et al, 2022). PBA is a type of authentication based on the individual's private items (i.e., token-based authentication).…”
Section: Introductionmentioning
confidence: 99%
“…1,2 Among several emerging biometric-based approaches, fingerprint and face-based authentication mechanisms are the most widely used. 3,4 The features of biometric traits and their authentication mechanisms, such as universality, permanence, uniqueness, the low storage requirement for storing biometric templates, ease of use in fields, inexpensive scanning devices, and so forth, 5 make biometric authentication an attractive option for a variety of applications such as in banking, for home security, and so forth. 6 A biometric-based authentication system requires a scanning device to capture biometric traits, a database to store enrolled biometric templates, and application software to capture and verify the biometric template of the subject.…”
Section: Introductionmentioning
confidence: 99%