Single Point Authentication by Multiple Factor Authentication
Main Article Content
Abstract
- Nowadays, Single Point Authentication is very a significant to solve a distributed authentication process. Due to the Single Sign on (SS0) by LDAP is popular solution. However, it still has some security vulnerabilities because a password is also vulnerable to leaking and forgetful. Although, There have been several solutions, such as TFA and OTP proposed previously to enhance the password leaking and forgetfulness but, they still have a lot of drawbacks. This paper analyzes the drawbacks of the previous solutions; then design and implement a new solution using LDAP, Web Services, Java program and J2ME technologies. By designing the authentication process at a single point authenticator and using multi-factor authentication together with challenge-response new S/Key OTP techniques. The new design called “Single Point Authentication by Multiple Factors Authentication (SPA-MFA)”. From experiments/evaluation, SPA-MFA is very effective, low cost, cheap and easy to implement.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
I/we certify that I/we have participated sufficiently in the intellectual content, conception and design of this work or the analysis and interpretation of the data (when applicable), as well as the writing of the manuscript, to take public responsibility for it and have agreed to have my/our name listed as a contributor. I/we believe the manuscript represents valid work. Neither this manuscript nor one with substantially similar content under my/our authorship has been published or is being considered for publication elsewhere, except as described in the covering letter. I/we certify that all the data collected during the study is presented in this manuscript and no data from the study has been or will be published separately. I/we attest that, if requested by the editors, I/we will provide the data/information or will cooperate fully in obtaining and providing the data/information on which the manuscript is based, for examination by the editors or their assignees. Financial interests, direct or indirect, that exist or may be perceived to exist for individual contributors in connection with the content of this paper have been disclosed in the cover letter. Sources of outside support of the project are named in the cover letter.
I/We hereby transfer(s), assign(s), or otherwise convey(s) all copyright ownership, including any and all rights incidental thereto, exclusively to the Journal, in the event that such work is published by the Journal. The Journal shall own the work, including 1) copyright; 2) the right to grant permission to republish the article in whole or in part, with or without fee; 3) the right to produce preprints or reprints and translate into languages other than English for sale or free distribution; and 4) the right to republish the work in a collection of articles in any other mechanical or electronic format.
We give the rights to the corresponding author to make necessary changes as per the request of the journal, do the rest of the correspondence on our behalf and he/she will act as the guarantor for the manuscript on our behalf.
All persons who have made substantial contributions to the work reported in the manuscript, but who are not contributors, are named in the Acknowledgment and have given me/us their written permission to be named. If I/we do not include an Acknowledgment that means I/we have not received substantial contributions from non-contributors and no contributor has been omitted.
References
2. "AuthAnvil", https://www.scorpionsoft.com/.
3. "FileID", https://www.fireid.com/.
4. "FiveBarGate", https://www.fivebargate.net/.
5. "Diversinet", https://www.diversinet.com.
6. "VeriSign Identity Protection", https://www.syma ntec.com/business/.
7. "Cellular Authentication Token", https://www. megaas.com/.
8. "Mobile One Time Passwords", https://motp. sourceforge.net
9. "1Key", https://www.rho.cc/index.php/software /1key.
10. "Supported fingerprint scanners and sensors", https:// www.neurotechnology.com/cgibin/finger print-scanners.cgi.
11. "Mobile Popular", https://www.reuters.com/.
12. "Strong Two Factor Authentication with RSA SecurID", SSH Communications Security Corp, Design Solution Report, November 2008.
13. "Communication technology trend and market report Quarter 3", The National Telecommunication Commission(NTC), Market Report 3, May 2008.
14. M. Benantar, Access control systems: security identity management and trust models, 2nd ed. Texas: Springer, 2006.
15. M. Bishop, Computer Security Art and Science, 1st ed. Massachusetts: Addison Wesley Professional, 2003.
16. M. Curtin, Brute force: cracking the data encryption standard, 1st ed. New York: Springer, 2005.
17. D. M'Raihi, M. Bellare, F. Hoornaert, D. Naccache, and O. Ranen, "HOTP: An HMAC-Based One-Time Password Algorithm", IETF, RFC 4226, December 2005.
18. S. Garfinkel, G. Spafford, and A. Schwartz, Practical UNIX and Internet Security, 3rd ed. California: O'Reilly Media, Inc, 2003.
19. K. Hausman and S. Cook, IT Architecture for Dummies, 3rd ed. New Jersey: Wiley Publishing Inc, 2011.
20. M. Hendry, Smart Card Security and Applications, 2nd ed. Washington D.C: Artech House, 2001.
21. S. Josefsson, "The Base16 Base32 and Base64 Data Encodings", IETF, RFC 4648, October 2006.
22. M.Wahl, "A Summary of the X.500(96) User Schema for use with LDAPv3", IETF, RFC 2256, December 1997.
23. N. Haller, C. Metz, P. Nesser, and M. Straw, "A One-Time Password System", IETF, RFC 2289, February 1998.
24. T. Plum and R. Bleiler, User authentication, 1st ed. Washington D.C: SPEC Kits, 2001.
25. D. M. Raihi, S.Machani, M.Pei, and J.Rydell, "TOTP: Time-Based One-Time Password Algorithm", IETF, RFC 6238, May 2011.
26. J. Sermersheim, "Lightweight Directory Access Protocol (LDAP):