Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions

02/20/2018
by   Mustafa A. Mustafa, et al.
0

This paper proposes a frictionless authentication system, provides a comprehensive security analysis of and proposes potential solutions for this system. It first presents a system that allows users to authenticate to services in a frictionless manner, i.e., without the need to perform any particular authentication-related actions. Based on this system model, the paper analyses security problems and potential privacy threats imposed on users, leading to the specification of a set of security and privacy requirements. These requirements can be used as a guidance on designing secure and privacy-friendly frictionless authentication systems. The paper also sketches three potential solutions for such systems and highlights their advantages and disadvantages.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/01/2020

An Efficient Anonymous Authentication Scheme Using Registration List in VANETs

Nowadays, Vehicular Ad hoc Networks (VANETs) are popularly known as they...
research
06/20/2022

Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication

The 5G mobile communication network provides seamless communications bet...
research
11/25/2021

Security Threats and Cellular Network Procedures for Unmanned Aircraft Systems

This paper discusses cellular network security for unmanned aircraft sys...
research
08/16/2021

Happy MitM: Fun and Toys in Every Bluetooth Device

Bluetooth pairing establishes trust on first use between two devices by ...
research
11/11/2016

HoneyFaces: Increasing the Security and Privacy of Authentication Using Synthetic Facial Images

One of the main challenges faced by Biometric-based authentication syste...
research
01/15/2021

Enhancing Security via Deliberate Unpredictability of Solutions in Optimisation

The main aim of decision support systems is to find solutions that satis...
research
12/18/2012

A trust-based security mechanism for nomadic users in pervasive systems

The emergence of network technologies and the appearance of new varied a...

Please sign up or login with your details

Forgot password? Click here to reset