基于改进默克尔谜题的智能认证

Abhijath Ande, Vishnu N Nair, Syed Ashlaan Ahmed, Alavalapati Goutham Reddy, L. Nkenyereye, H. Kim
{"title":"基于改进默克尔谜题的智能认证","authors":"Abhijath Ande, Vishnu N Nair, Syed Ashlaan Ahmed, Alavalapati Goutham Reddy, L. Nkenyereye, H. Kim","doi":"10.1109/TENSYMP52854.2021.9550956","DOIUrl":null,"url":null,"abstract":"Most computer users practice password-based authentication as the first layer of security due to its easy implementation. Yet, the technology advancements have provided the attackers with enough resources to get the password by trying out diverse means. In addition, there is a burden of entering a password when the user wants to access the computer, which is comprehended as discomfort to the user. Given this discomfort, the users often leave the computer in an unlocked state while moving away. The computer in this situation is most vulnerable and makes it susceptible to lunchtime attacks.To address the aforementioned issues, we propose a method called smart authentication that requires minimal user interaction with the computer. Smart authentication encompasses the concepts of authentication, de-authentication, and re-authentication under the same hood. The proposed method uses continuous authentication so that the concepts called de-authentication and re-authentication can be implemented with an insignificant effort. Considering the constraints associated with password-based authentication, second factors of authentication have been introduced as an additional security feature. Due to the difficulty of carrying extra hardware components around all of the time, the proposed approach considers the smartphone device as the second factor. Hardware cost is another aspect that ascends scalability concerns to most of these approaches. The proposed approach aims to use existing hardware commonly found in modern desktop machines and thereby decrease the cost factor of scalability drastically.","PeriodicalId":137485,"journal":{"name":"2021 IEEE Region 10 Symposium (TENSYMP)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Smart Authentication based on Modified Merkle Puzzles\",\"authors\":\"Abhijath Ande, Vishnu N Nair, Syed Ashlaan Ahmed, Alavalapati Goutham Reddy, L. Nkenyereye, H. Kim\",\"doi\":\"10.1109/TENSYMP52854.2021.9550956\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Most computer users practice password-based authentication as the first layer of security due to its easy implementation. Yet, the technology advancements have provided the attackers with enough resources to get the password by trying out diverse means. In addition, there is a burden of entering a password when the user wants to access the computer, which is comprehended as discomfort to the user. Given this discomfort, the users often leave the computer in an unlocked state while moving away. The computer in this situation is most vulnerable and makes it susceptible to lunchtime attacks.To address the aforementioned issues, we propose a method called smart authentication that requires minimal user interaction with the computer. Smart authentication encompasses the concepts of authentication, de-authentication, and re-authentication under the same hood. The proposed method uses continuous authentication so that the concepts called de-authentication and re-authentication can be implemented with an insignificant effort. Considering the constraints associated with password-based authentication, second factors of authentication have been introduced as an additional security feature. Due to the difficulty of carrying extra hardware components around all of the time, the proposed approach considers the smartphone device as the second factor. Hardware cost is another aspect that ascends scalability concerns to most of these approaches. The proposed approach aims to use existing hardware commonly found in modern desktop machines and thereby decrease the cost factor of scalability drastically.\",\"PeriodicalId\":137485,\"journal\":{\"name\":\"2021 IEEE Region 10 Symposium (TENSYMP)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-08-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE Region 10 Symposium (TENSYMP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TENSYMP52854.2021.9550956\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Region 10 Symposium (TENSYMP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TENSYMP52854.2021.9550956","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

大多数计算机用户将基于密码的身份验证作为第一层安全,因为它易于实现。然而,技术的进步为攻击者提供了足够的资源,通过尝试各种方法来获取密码。此外,当用户想要访问计算机时,还需要输入密码,这对用户来说是一种不舒服。考虑到这种不舒服,用户经常在离开时让电脑处于解锁状态。在这种情况下,计算机是最脆弱的,使它容易受到午餐时间的攻击。为了解决上述问题,我们提出了一种称为智能身份验证的方法,它需要最少的用户与计算机的交互。智能身份验证包含身份验证、取消身份验证和重新身份验证的概念。所提出的方法使用连续身份验证,因此可以毫不费力地实现取消身份验证和重新身份验证的概念。考虑到与基于密码的身份验证相关的约束,我们引入了身份验证的第二个因素,作为额外的安全特性。由于随身携带额外的硬件组件很困难,因此提出的方法将智能手机设备视为第二个因素。硬件成本是使大多数这些方法的可伸缩性受到关注的另一个方面。所提出的方法旨在使用现代桌面机器中常见的现有硬件,从而大幅降低可伸缩性的成本因素。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Smart Authentication based on Modified Merkle Puzzles
Most computer users practice password-based authentication as the first layer of security due to its easy implementation. Yet, the technology advancements have provided the attackers with enough resources to get the password by trying out diverse means. In addition, there is a burden of entering a password when the user wants to access the computer, which is comprehended as discomfort to the user. Given this discomfort, the users often leave the computer in an unlocked state while moving away. The computer in this situation is most vulnerable and makes it susceptible to lunchtime attacks.To address the aforementioned issues, we propose a method called smart authentication that requires minimal user interaction with the computer. Smart authentication encompasses the concepts of authentication, de-authentication, and re-authentication under the same hood. The proposed method uses continuous authentication so that the concepts called de-authentication and re-authentication can be implemented with an insignificant effort. Considering the constraints associated with password-based authentication, second factors of authentication have been introduced as an additional security feature. Due to the difficulty of carrying extra hardware components around all of the time, the proposed approach considers the smartphone device as the second factor. Hardware cost is another aspect that ascends scalability concerns to most of these approaches. The proposed approach aims to use existing hardware commonly found in modern desktop machines and thereby decrease the cost factor of scalability drastically.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信