An Event-Driven Authentication Approach for Mediation of User Actions

K. Marshall, Thomas Cantido, Jonathan Case, L. Nguyen, H. El-Razouk
{"title":"An Event-Driven Authentication Approach for Mediation of User Actions","authors":"K. Marshall, Thomas Cantido, Jonathan Case, L. Nguyen, H. El-Razouk","doi":"10.1109/iemcon53756.2021.9623209","DOIUrl":null,"url":null,"abstract":"Traditional authentication schemes challenge the user by something only they know, often a username and password, and become more robust with two-factor authentication. However, a new security problem arises when the system or service cannot ensure accountability for all events that occur within some user application. The vulnerability exists in authentication mechanisms that fail to provide security for events that occur after the login stage. This accountability issue leaves users susceptible to physical and cyber-attacks, such as physical compromises or Man-in-the-Middle (MITM) and replay attacks. In these cases the user is held accountable for these actions and the server is unaware that the legitimate user is no longer near the active session. Therefore, an additional authentication mechanism is needed to provide security up to the application layer when critical events are attempted. In this paper we study a practical, user-friendly approach to mediate critical events by authentication to verify the legitimate user is still near the live session. Critical events are authenticated by pairing the PC with the user's mobile smart device over a connection medium to determine if both devices are within an acceptable range. Afterwards, the PC sends a cryptographic challenge that can only be answered by the user's devices using the public key infrastructure and digital signatures. The smartphone replies back to the PC with a challenge, so that both devices can guarantee mutual authentication.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iemcon53756.2021.9623209","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Traditional authentication schemes challenge the user by something only they know, often a username and password, and become more robust with two-factor authentication. However, a new security problem arises when the system or service cannot ensure accountability for all events that occur within some user application. The vulnerability exists in authentication mechanisms that fail to provide security for events that occur after the login stage. This accountability issue leaves users susceptible to physical and cyber-attacks, such as physical compromises or Man-in-the-Middle (MITM) and replay attacks. In these cases the user is held accountable for these actions and the server is unaware that the legitimate user is no longer near the active session. Therefore, an additional authentication mechanism is needed to provide security up to the application layer when critical events are attempted. In this paper we study a practical, user-friendly approach to mediate critical events by authentication to verify the legitimate user is still near the live session. Critical events are authenticated by pairing the PC with the user's mobile smart device over a connection medium to determine if both devices are within an acceptable range. Afterwards, the PC sends a cryptographic challenge that can only be answered by the user's devices using the public key infrastructure and digital signatures. The smartphone replies back to the PC with a challenge, so that both devices can guarantee mutual authentication.
一种事件驱动的用户行为中介认证方法
传统的身份验证方案向用户提出只有他们自己知道的问题,通常是用户名和密码,而采用双因素身份验证将变得更加健壮。但是,当系统或服务不能确保对某些用户应用程序中发生的所有事件负责时,就会出现新的安全问题。该漏洞存在于无法为登录阶段之后发生的事件提供安全性的身份验证机制中。这种责任问题使用户容易受到物理和网络攻击,例如物理折衷或中间人(MITM)和重放攻击。在这些情况下,用户对这些操作负责,服务器不知道合法用户不再靠近活动会话。因此,需要一个额外的身份验证机制,以便在尝试发生关键事件时向应用层提供安全性。在本文中,我们研究了一种实用的、用户友好的方法,通过身份验证来中介关键事件,以验证合法用户仍然在活动会话附近。关键事件通过将PC与用户的移动智能设备在连接介质上配对来验证,以确定两个设备是否在可接受的范围内。然后,PC发送一个加密挑战,该挑战只能由用户的设备使用公钥基础设施和数字签名来回答。智能手机以挑战的方式回复PC,这样两台设备就可以保证相互认证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信