security levels for web authentication using mobile phones
play

Security Levels for Web Authentication Using Mobile Phones Anna - PDF document

2010-08-13 Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri Linkping University IDA/ADIT PrimeLife Summer School 2010 1 Agenda Problems with web authentication Mobile phones in


  1. 2010-08-13 Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri Linköping University – IDA/ADIT PrimeLife Summer School 2010 1 Agenda  Problems with web authentication  Mobile phones in authentication  Security levels  Our approach: Using security levels for evaluation and design of mobile phone authentication  Conclusions and future work 2 Linköpings universitet 1

  2. 2010-08-13 Problems with Web Authentication  Passwords are insecure  Eavesdropping  Key loggers  Passwords are valuable  Hardware devices for strong authentication  Distribution  Availability  The mobile phone – a non-dedicated device 3 Mobile Phones in Authentication Local computer Remote server Short-range channels Long-range channels 4 Linköpings universitet 2

  3. 2010-08-13 NIST Security Levels for Authentication  Level 1: Lowest level. No identity proof.  Level 2: Single factor authentication.  No replay attacks  No eavesdropping  Level 3: Multi factor authentication.  No MiTM attacks  Possible to lock the device  Level 4: Highest level. Requires secure hardware. 5 Security Levels + Other Factors  Level 1: Lowest level. No identity proof.  Level 2: Single factor authentication.  Level 3: Multi factor authentication.  Level 4: Highest level. Requires secure hardware. Availability Usability 6 Linköpings universitet 3

  4. 2010-08-13 Design and Evaluation Method Design: Start with a security level Evaluation: Start with a solution 1. Authentication methods 2. Locking methods 3. Eavesdropping 4. Man-in-the-Middle-attacks 5. Other factors 6. Conclusion: Solution or level 7 Conclusions and Future Work  Evaluation and design method for web authentication with mobile phones  Future work:  Include protocols and hardware modules  Add new factors  Adapt the method for different services  Let the user switch security level 8 Linköpings universitet 4

  5. 2010-08-13 Any questions? 9 Linköpings universitet 5

Recommend


More recommend