Digital Library

cab1

 
Title:      A SUPPORT ARCHITECTURE FOR MULTI-CHANNEL, MULTI-FACTOR AUTHENTICATION
Author(s):      Karen Renaud , Richard Cooper , Mohamed Al Fairuz
ISBN:      978-972-8924-49-2
Editors:      Sandeep Krishnamurthy and Pedro Isaías
Year:      2007
Edition:      Single
Keywords:      Authentication, Channels, Security, Architecture, Scenarios
Type:      Full Paper
First Page:      59
Last Page:      66
Language:      English
Cover:      cover          
Full Contents:      click to dowload Download
Paper Abstract:      As more and more critically confidential information is managed electronically by distributed information systems, efforts to gain unauthorised access to that information become more prevalent. Traditional authentication mechanisms, such as passwords and PINs, are fairly weak mechanisms for controlling access to critical resources and excluding unauthorised users. This is because mechanisms which utilise only one “factor”, such as a password or PIN, are increasingly easy to subvert. It has become essential for us to consider making use of multiple mechanisms and/or channels to strengthen security. For instance, an authentication attempt that requires a password to be entered may require verification by means of entry of a one-time password, on another channel, which is delivered to the user’s registered mobile phone. In this paper we propose an architecture to support multi-channel authentication. The architecture allows a range of authentication channels to be deployed and consults the user about his or her personal preferences within risk-based constraints. The user is given the flexibility to choose from an available selection of channels and mechanisms which will be combined to achieve successful, secure and flexible authentication. Such a mechanism can be associated with a secured resource and thus improve the security of the access mechanism. Furthermore, the personalised choices can be changed by the users, making it easier to foil potential intruders by introducing unpredictability into the system.
   

Social Media Links

Search

Login