Generally, the authentication scheme that user experiences are mostly very kind or very firm. Authentication has been a very remarkable approach, throughout the years.Authentication is the utmost significant security service can be provided to the system by different authentication schemes. Authentication on protects any system from unauthorized, so that only authorized persons can have right to use or handle that system & data related to that system securely. Many effective and secure authentication schemes are available, having some drawback.
Commonly, four types of authentication techniques are available such as:
1.Knowledge based:means what you know. The best example of this authentication scheme is textual password.
2.Recognition Based:means what you recognize. Example includes graphical password, iris recognition, face recognition, etc.
3.Biometrics: means what you are. Includes Thumb impression, voice recognition, etc.
4.Token based: means what you have. This includes Credit cards, ATM cards, etc. as an example.
According to nature of scheme and method used preferably, two types of authentication schemes are available:
A.Recall based
In this authentication scheme, user is required to recall or remember his/her password which had been created before.The user need to reproduce or repeat a secret at the user had created previously in recall based techniques. Knowledge based authentication is a part of this technique. Textual password is the most commonly used recall based authentication scheme used in the computer world where security is needed. Textual password has one major disadvantage due to its two contradictory requirements at the same time; password selection must easy to remember and tough to guess.
B.Recognition based
This scheme, user is required to identify and recognize his/ her password that had been created before.Recognition based authentication can be used in graphical password. The user need to identify and recognize the secret, or part of the secret, that the user had already selected previously in recognition based techniques. With graphical passwords, user can recall and recognize images, part of image.Moreover, graphical passwords are vulnerable to shoulder surfing attacks as graphical passwords can easily be observed and recorded while the authenticated user is out graphical password.At present, most graphical passwords are still in their research stage and need more enrichment and usability trainings to deploy them in the arcade.
o



0 comments:
Post a Comment