2018
DOI: 10.1007/s11235-018-0437-1
|View full text |Cite
|
Sign up to set email alerts
|

User perspective and security of a new mobile authentication method

Abstract: This paper describes a new mobile authentication method which is based on an Open ID Connect standard and subscriber identity module card. The proposed solution enables users to access websites, services and applications without the need to remember passwords, responses or support of any equipment. The proposed method is evaluated from the users' perspective as well as from the security viewpoint. Moreover, we compare it with the two most popular existing authentication schemes i.e. static passwords and SMS OT… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 26 publications
(33 reference statements)
0
4
0
Order By: Relevance
“…IoT has brought numerous benefits, but they also present significant privacy threats. [48][49][50] Thus, covert channels can be used as a countermeasure for transmitting confidential information in unsecure mobile networks. [51][52][53][54][55][56] Covert channels can outmenuver network security measures and stealthily transmit a covert message.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…IoT has brought numerous benefits, but they also present significant privacy threats. [48][49][50] Thus, covert channels can be used as a countermeasure for transmitting confidential information in unsecure mobile networks. [51][52][53][54][55][56] Covert channels can outmenuver network security measures and stealthily transmit a covert message.…”
Section: Discussionmentioning
confidence: 99%
“…IoT has brought numerous benefits, but they also present significant privacy threats 48–50 . Thus, covert channels can be used as a countermeasure for transmitting confidential information in unsecure mobile networks 51–56 .…”
Section: Related Workmentioning
confidence: 99%
“…The proposed work is suitable for real-time applications. In [22], privacy and ease of use of a novel smartphone authentication process are offered. The subscriber identity module and open ID connects describe the proposed method.…”
Section: Related Workmentioning
confidence: 99%
“…CONCLUSION There are ongoing advancements in 2FA research and development, including the use of biometrics, wearable devices, behavioralbased methods, and machine learning algorithms, among others, to further enhance the security and usability of 2FA. Hence, this secure authentication system significantly increases the security of online accounts and systems by requiring users to provide two different forms of authentication [6], typically something they know (e.g., password) and something they have (biometric feature) [11], making it more difficult for unauthorized users to gain access.…”
Section: Comparison With Existing Systemmentioning
confidence: 99%