Affiliation:
1. York St. John University, UK
Abstract
A secure authentication system ensures that the claimant is the genuine user attempting to access the system and that it is not susceptible to misidentification, forgetfulness, or reproduction. While technological advancements in the authentication process continue to advance, most authentication systems still have room for improvement, particularly in terms of accuracy, tolerance to various security attacks, noise, and scalability as the number of smart devices grows. In this chapter, the authors look at the security, effectiveness, and drawbacks of knowledge-based, ownership-based, location-based, and social-based authentication systems, as well as some unresolved issues and potential future research directions.
Reference90 articles.
1. Ashfield, J., Shroyer, D., & Brown, D. (2012, October 23). Location based authentication of mobile device transactions. Google Patents. (US Patent 8,295,898)
2. Bang, Y., Lee, D.J., Bae, Y.S., & Ahn, J.H. (2012). Improving information security management: An analysis of id–password usage and a new login vulnerability measure. International Journal of Information Management, 32 (5), 409–418.
3. A comprehensive study of phishing attacks.;M. N.Banu;International Journal of Computer Science and Information Technologies,2013
4. Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks
5. BlockiJ.HarshaB.ZhouS. (2018). On the economics of offline password cracking. In 2018 ieee symposium on security and privacy (sp). IEEE.