security levels for web authentication using mobile phones
play

Security Levels for Web Authentication Using Mobile Phones Anna - PDF document

2010-08-13 Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri Linkping University IDA/ADIT PrimeLife Summer School 2010 1 Agenda Problems with web authentication Mobile phones in


  1. 2010-08-13 Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri Linköping University – IDA/ADIT PrimeLife Summer School 2010 1 Agenda  Problems with web authentication  Mobile phones in authentication  Security levels  Our approach: Using security levels for evaluation and design of mobile phone authentication  Conclusions and future work 2 Linköpings universitet 1

  2. 2010-08-13 Problems with Web Authentication  Passwords are insecure  Eavesdropping  Key loggers  Passwords are valuable  Hardware devices for strong authentication  Distribution  Availability  The mobile phone – a non-dedicated device 3 Mobile Phones in Authentication Local computer Remote server Short-range channels Long-range channels 4 Linköpings universitet 2

  3. 2010-08-13 NIST Security Levels for Authentication  Level 1: Lowest level. No identity proof.  Level 2: Single factor authentication.  No replay attacks  No eavesdropping  Level 3: Multi factor authentication.  No MiTM attacks  Possible to lock the device  Level 4: Highest level. Requires secure hardware. 5 Security Levels + Other Factors  Level 1: Lowest level. No identity proof.  Level 2: Single factor authentication.  Level 3: Multi factor authentication.  Level 4: Highest level. Requires secure hardware. Availability Usability 6 Linköpings universitet 3

  4. 2010-08-13 Design and Evaluation Method Design: Start with a security level Evaluation: Start with a solution 1. Authentication methods 2. Locking methods 3. Eavesdropping 4. Man-in-the-Middle-attacks 5. Other factors 6. Conclusion: Solution or level 7 Conclusions and Future Work  Evaluation and design method for web authentication with mobile phones  Future work:  Include protocols and hardware modules  Add new factors  Adapt the method for different services  Let the user switch security level 8 Linköpings universitet 4

  5. 2010-08-13 Any questions? 9 Linköpings universitet 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend