Accomplishments

Mitigating Vulnerabilities in 3-Factor Based Authentication


  • Details
  • Share
Category
Articles
Publisher
Ijca
Publishing Date
01-Aug-2017
volume
Volume 76 - No. 10
Issue
No. 10
Pages
19-23
  • Abstract

Remote user authentication schemes are use to identify auser in the distributed environment. There are three differentfactors commonly use for authentication purpose named aspassword, smart card and biometric. It is been observedthat authentication protocols designed till date are based onpassword. Normally, password is used as a ?rst authenticationfactor, where as other two factors are included accordingto the level of security requirements. In this paper, analysisof 3-factor based protocols is done on the basis of wrongpassword input and stolen smart card vulnerabilities. Paperalso suggest the improvements to control these vulnerabilities.

Apply Now Enquire Now