Skip to main content

2024 | OriginalPaper | Buchkapitel

Enhancing Security Using E-Authentication System

verfasst von : Mohammad Ali A. Hammoudeh, Amjad Ebrahim, Esraa Mohamed, Rawan Almansour, Renad Ibrahim

Erschienen in: Advances in Emerging Information and Communication Technology

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Electronic authentication (or “e-authentication”) is one of the key topics in the field of cybersecurity. It is the electronic verification process for identifying an entity. As person using a mobile/computer itself or a mobile/computer program. Authenticate the real user behind attempts to access these systems through secret ways as well. On the other hand, e-authentication applications are widely embraced nowadays. It is a security concern if one has to handle of such kind of service. For example, the present network employs a card-based security system to verify legitimacy of the user accessing, but it is neither reliable nor temporal. The aim of our system is to provide user secure login systems more compliable and reliable. This paper will be useful to eliminate many problems inherent in traditional login techniques in E-government.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A.A. Azeez, A. Ajibola, A secured medical booking system using qr-code authentication. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. (2019) A.A. Azeez, A. Ajibola, A secured medical booking system using qr-code authentication. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. (2019)
2.
Zurück zum Zitat K.-C. Liao, W.-H. Lee, M.-H. Sung, T.-C. Lin, A one-time password scheme with qr-code based on mobile phone, in 2009 Fifth International Joint Conference on INC, IMS and IDC, (IEEE, 2009), pp. 2069–2071CrossRef K.-C. Liao, W.-H. Lee, M.-H. Sung, T.-C. Lin, A one-time password scheme with qr-code based on mobile phone, in 2009 Fifth International Joint Conference on INC, IMS and IDC, (IEEE, 2009), pp. 2069–2071CrossRef
3.
Zurück zum Zitat S.K. Dora, P. Dubey, Software development life cycle (sdlc) analytical comparison and survey on traditional and agile methodology. National Monthly Refereed J. Res. Sci. Technol. 2(8), 22–30 (2013) S.K. Dora, P. Dubey, Software development life cycle (sdlc) analytical comparison and survey on traditional and agile methodology. National Monthly Refereed J. Res. Sci. Technol. 2(8), 22–30 (2013)
4.
Zurück zum Zitat D. M’Raihi, S. Machani, M. Pei, J. Rydell, Totp: time-based one-time password algorithm. Tech. Rep. (2011) D. M’Raihi, S. Machani, M. Pei, J. Rydell, Totp: time-based one-time password algorithm. Tech. Rep. (2011)
5.
Zurück zum Zitat K. Reese, T. Smith, J. Dutson, J. Armknecht, J. Cameron, K. Seamons, A usability study of five {Two-Factor} authentication methods, in Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), (2019), pp. 357–370 K. Reese, T. Smith, J. Dutson, J. Armknecht, J. Cameron, K. Seamons, A usability study of five {Two-Factor} authentication methods, in Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), (2019), pp. 357–370
6.
Zurück zum Zitat G. Ali, M. Ally Dida, A. Elikana Sam, Two-factor authentication scheme for mobile money: a review of threat models and countermeasures. Future Internet 12(10), 160 (2020)CrossRef G. Ali, M. Ally Dida, A. Elikana Sam, Two-factor authentication scheme for mobile money: a review of threat models and countermeasures. Future Internet 12(10), 160 (2020)CrossRef
7.
Zurück zum Zitat O. Ussatova, S. Nyssanbayeva, W. Wójcik, Two-factor authentication algorithm implementation with additional security parameter based on mobile application, in Proceedings on International Conference on Wireless Communication, Network and Multimedia Engineering (WCNME2019), (2019), pp. 84–86 O. Ussatova, S. Nyssanbayeva, W. Wójcik, Two-factor authentication algorithm implementation with additional security parameter based on mobile application, in Proceedings on International Conference on Wireless Communication, Network and Multimedia Engineering (WCNME2019), (2019), pp. 84–86
8.
Zurück zum Zitat S. Pranata, H.T. Nugroho, 2fysh: two-factor authentication you should have for password replacement. Telkomnika 17(2), 693–702 (2019)CrossRef S. Pranata, H.T. Nugroho, 2fysh: two-factor authentication you should have for password replacement. Telkomnika 17(2), 693–702 (2019)CrossRef
9.
Zurück zum Zitat Y. Miao, Q. Huang, M. Xiao, H. Li, Decentralized and privacy-preserving public auditing for cloud storage based on blockchain. IEEE Access 8, 139813–139826 (2020)CrossRef Y. Miao, Q. Huang, M. Xiao, H. Li, Decentralized and privacy-preserving public auditing for cloud storage based on blockchain. IEEE Access 8, 139813–139826 (2020)CrossRef
10.
Zurück zum Zitat M. Shah, M. Shaikh, V. Mishra, G. Tuscano, Decentralized cloud storage using blockchain, in 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), (IEEE, 2020), pp. 384–389CrossRef M. Shah, M. Shaikh, V. Mishra, G. Tuscano, Decentralized cloud storage using blockchain, in 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), (IEEE, 2020), pp. 384–389CrossRef
11.
Zurück zum Zitat M.A.A. Hammoudeh, A. Alobaid, A. Alwabli, F. Alabdulmunim, The study on assessment of security web applications. Int. J. Interact. Mobile Technol. 15(23) (2021) M.A.A. Hammoudeh, A. Alobaid, A. Alwabli, F. Alabdulmunim, The study on assessment of security web applications. Int. J. Interact. Mobile Technol. 15(23) (2021)
12.
Zurück zum Zitat B. Rodrigues, A. Chaudhari, S. More, Two factor verification using qr-code: a unique authentication system for android smartphone users, in 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), (IEEE, 2016), pp. 457–462CrossRef B. Rodrigues, A. Chaudhari, S. More, Two factor verification using qr-code: a unique authentication system for android smartphone users, in 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), (IEEE, 2016), pp. 457–462CrossRef
13.
Zurück zum Zitat M.T.R.M. Teja, K. Praveen, Prevention of phishing attacks using qr code safe authentication, in Inventive Computation and Information Technologies: Proceedings of ICICIT 2021, vol. 336, (2022), p. 361CrossRef M.T.R.M. Teja, K. Praveen, Prevention of phishing attacks using qr code safe authentication, in Inventive Computation and Information Technologies: Proceedings of ICICIT 2021, vol. 336, (2022), p. 361CrossRef
Metadaten
Titel
Enhancing Security Using E-Authentication System
verfasst von
Mohammad Ali A. Hammoudeh
Amjad Ebrahim
Esraa Mohamed
Rawan Almansour
Renad Ibrahim
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-53237-5_28

Premium Partner