Security revisited: Honeytokens meet Google authenticator

Document Type

Conference Proceeding

Publication Title

7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference, SEEDA-CECNSM 2022

Publisher

IEEE

School

School of Science

RAS ID

54183

Comments

Papaspirou, V., Papathanasaki, M., Maglaras, L., Kantzavelou, I., Douligeris, C., Ferrag, M. A., & Janicke, H. (2022, September). Security revisited: Honeytokens meet Google authenticator. In 2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM) (pp. 1-8). IEEE. https://doi.org/10.1109/SEEDA-CECNSM57760.2022.9932907

Abstract

In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more factors improved existing authentication procedures and gave rise to new multi-factor authentication schemes, more advanced and focused assaults have revealed they are also sensitive and ineffective to assure only authorized access to systems. This study suggests a revolutionary two-factor authentication mechanism that uses QR codes and honeytokens. In the current implementation, honeywords and Google authenticator work together. In order to speed up the identification process, the honeywords technique is utilized as a second factor on a different computing device. By using a stronger and more effective authentication mechanism than a single password mechanism or a common two-factor authentication scheme, the novel and straightforward approach presented here intends to add additional layers of security and protection into a system, thereby increasing its security.

DOI

10.1109/SEEDA-CECNSM57760.2022.9932907

Access Rights

subscription content

Share

 
COinS