NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // UBICOMM 2020, The Fourteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies // View article ubicomm_2020_3_10_10031


A Study on the Security of Authentication Systems

Authors:
Otuekong Umoren
Hector Marco-Gisbert

Keywords: graphical password; cryptographic key; password authentication; graphical authentication; biometric.

Abstract:
In the age of digitalization, passwords play a significant role to protect user information. The growing number of data breaches has become a major problem allowing unauthorised parties to access confidential data. Over the years, passwords have been the first factor of authentication that is used in various segments, such as web applications, banking, e-commerce, and applications for authentication, etc. In most cases, the passwords are usually assigned to or created by the authorized user, and must be kept secret to keep unauthorized users from having access to information it is meant to protect. However, recent attacks have shown that these passwords are vulnerable to attacks such as, the dictionary, brute force, man in the middle, traffic interception, social engineering, and key logger attack, etc. In this paper, we discuss different types of passwords that prevent unauthorised access to protect users’ information. We analyze various attack techniques that are leveraged in many ways to obtain passwords. We also discuss the available protection techniques that aim to protect passwords. However, our analysis reveals that the protection techniques are not sturdy and fail to provide enough protection against the most utilised attack techniques, hence, requiring to have more advanced techniques in place.

Pages: 64 to 69

Copyright: Copyright (c) IARIA, 2020

Publication date: October 25, 2020

Published in: conference

ISSN: 2308-4278

ISBN: 978-1-61208-811-2

Location: Nice, France

Dates: from October 25, 2020 to October 29, 2020

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.