Security Levels for Web Authentication Using Mobile Phones Anna - - PDF document

security levels for web authentication using mobile phones
SMART_READER_LITE
LIVE PREVIEW

Security Levels for Web Authentication Using Mobile Phones Anna - - PDF document

2010-08-13 Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri Linkping University IDA/ADIT PrimeLife Summer School 2010 1 Agenda Problems with web authentication Mobile phones in


slide-1
SLIDE 1

2010-08-13 Linköpings universitet 1

1

Security Levels for Web Authentication Using Mobile Phones

Anna Vapen and Nahid Shahmehri

Linköping University – IDA/ADIT PrimeLife Summer School 2010

2

Agenda

  • Problems with web authentication
  • Mobile phones in authentication
  • Security levels
  • Our approach: Using security levels for evaluation and design
  • f mobile phone authentication
  • Conclusions and future work
slide-2
SLIDE 2

2010-08-13 Linköpings universitet 2

3

Problems with Web Authentication

  • Passwords are insecure
  • Eavesdropping
  • Key loggers
  • Passwords are valuable
  • Hardware devices for strong authentication
  • Distribution
  • Availability
  • The mobile phone – a non-dedicated device

4

Mobile Phones in Authentication

Long-range channels Short-range channels Local computer Remote server

slide-3
SLIDE 3

2010-08-13 Linköpings universitet 3

5

NIST Security Levels for Authentication

  • Level 1: Lowest level. No identity proof.
  • Level 2: Single factor authentication.
  • No replay attacks
  • No eavesdropping
  • Level 3: Multi factor authentication.
  • No MiTM attacks
  • Possible to lock the device
  • Level 4: Highest level. Requires secure hardware.

6

Security Levels + Other Factors

  • Level 1: Lowest level. No identity proof.
  • Level 2: Single factor authentication.
  • Level 3: Multi factor authentication.
  • Level 4: Highest level. Requires secure hardware.

Availability Usability

slide-4
SLIDE 4

2010-08-13 Linköpings universitet 4

7

Design and Evaluation Method

Design: Start with a security level Evaluation: Start with a solution

1. Authentication methods 2. Locking methods 3. Eavesdropping 4. Man-in-the-Middle-attacks 5. Other factors 6. Conclusion: Solution or level

8

Conclusions and Future Work

  • Evaluation and design method for web authentication with

mobile phones

  • Future work:
  • Include protocols and hardware modules
  • Add new factors
  • Adapt the method for different services
  • Let the user switch security level
slide-5
SLIDE 5

2010-08-13 Linköpings universitet 5

9

Any questions?