Assessment of Authentication Methods Through Qualitative Metrics
DOI:
https://doi.org/10.31305/trjtm2025.v05.n01.007Keywords:
Authentication, Security, Multi-Factor Authentication, Biometric Authentication, Digital Identity VerificationAbstract
These days, the internet is an essential tool for all fields. Every aspect of life—individuals, organizations, businesses, trade, and governments—is subject to safety regulations for their online actions. For e-cash and identification papers to be accessible with a particular level of validity, they require various authorization and certification. Nonetheless, any entity's security and privacy in the digital realm are invariably compromised in one way or another. Authentication is in progress to confirm the identity of the person wishing to use a system's resources. However, there is a trade-off between these methods' security and usefulness. This study examines the state-of-the-art authentication techniques, methodologies, mechanisms, and protocols currently used. Given the growing use of authentication and the academics' apparent lack of interest in efficiency, it seemed relevant to examine it from an efficiency standpoint. Consequently, various efficiency-related cues are obtained, which may lead to the creation of both successful and efficient authentication methods.
References
K. Govindaa, Dr.E.Sathiyamoorthy, “Identity Anonymization and Secure Data Storage using Group Signature in Private Cloud”, Procedia Technology 4 (2012), 495 – 499.
M. N. Wegman and J. L. Carter, New Hash Functions and Their Use in Authentication and Set Equality, Journal of Computer and System Sciences 22, pp. 265-279 (1981).
Ullah A., Xiao H., Lilley M., Barker T. "Usability of Profile Based Student Authentication and Traffic Light System in Online Examination." The 7th International Conference for Internet Technology and Secured Transactions (ICITST); London, UK: IEEE; 2012.
Chen Y, Liginlal D (2008) Maximum entropy approach to feature selection in knowledge-based authentication. Decis Support Syst 46(1):388–398.
Bruns R, Dunkel J, Von Helden J (2003) Secure Smart Card-Based Access To An eLearning Portal. Proceedings of the 5th International Conference on Enterprise Information Systems (ICEIS), Angers, France.
Gil C, Castro M, Wyne M (2010) Identification in Web Evaluation in Learning Management System by Fingerprint Identification System. In: Frontiers in Education Conference (FIE). IEEE, WA, USA.
Sahoo SK, Choubisa T (2012) Multimodal biometric person authentication: a review. IETE Tech Rev 29(1):54.
D. L. Jobusch, A. E. Oldehoeft, “A survey of password mechanisms: Weaknesses and potential improvements,” Computers and Security, Vol. 8, no. 8, 1989, pp. 675-689.
S. M. Furnell, P. S. Dowland, H. M. Illingworth, P. L. Reynolds, “Authentication and supervision: A survey of user attitudes,” Computers and Security, Vol. 19, no. 6, 2000, pp. 529-539.
L. O’Gorman, “Seven issues with human authentication technologies,” IEEE Workshop on Automatic Identification Advanced Technologies, Tarrytown, New York, March 2002, pp. 185-186.
N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems,” IBM Systems J., Vol. 40, No. 3, 2001.
Jan Vossaert, Jorn Lapon, and Vincent Naessens, “Out-of-Band Password Based Authentication towards Web Services,” ECUMICT, 2014. DOI: 10.1007/978-3-319-05440-7_15.
Gunson, Nancie, et al. "User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking." Computers & Security 30.4 (2011): 208-220.
Petsas, Thanasis, et al. "Two-factor authentication: is the world ready?: quantifying 2FA adoption." Proceedings of the Eighth European Workshop on System Security. ACM, 2015.
He, D., Chan, S., Chen, C., & Bu, J. (2010). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications. DOI: 10.1007/s11277-010-0033-5.
Jiang, Q., Ma, J., Li, G., and Yang, L., An enhanced authentication scheme with anonymity for roaming service in global mobility networks. Wirel. Pers. Commun., 2012. DOI: 10.1007/s11277-012-0535-4.
Ming-Chin Chuang, Jeng-Farn Lee, “TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks”, IEEE Systems Journal, (2013).
“Security Forum on Single Sign-On,” The Open Group [Online]. Available: http://www.opengroup.org/security/l2-sso.htm.
C.-C. Chang and C.-Y. Lee, “A secure single sign-on mechanism for distributed computer networks,” IEEE Trans. Ind. Electron., vol. 59, no.1, pp. 629–637, Jan. (2012).
J. Han, Y. Mu, W. Susilo, and J. Yan, “A generic construction of dynamic single sign-on with strong security,” in Proc. SecureComm’, (2010), pp. 181–198, Springer.
G. Wang, J. Yu, and Q. Xie, “Security analysis of a single sign-on mechanism for distributed computer networks,” IEEE Trans. On Industrial Informatics, DOI: 10.1109/TII.2012.2215877.
Y. Hao, T. Han and Y. Cheng. A cooperative message authentication protocol in VANETs. Global Communications Conference (GLOBECOM). 2012: 5562-5566.
GUO Yunchuan, YIN Lihua, LIU Lica, FANG Binxing, “Utility-based Cooperative Decision in Cooperative Authentication,” IEEE INFOCOM 2014.
Yong Hao, Yu Cheng, “A Distributed Key Management Framework with Cooperative Message Authentication in VANETs,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 3, March 2011.
J. Clark and J. Jacob. A survey of authentication protocol literature. Web Draft Version 1.0 available from www.cs.york.ac.uk/~jac/, 1997.