Cargando…
A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication
A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture, breaking the simplicity of the typical client...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7435875/ https://www.ncbi.nlm.nih.gov/pubmed/32751189 http://dx.doi.org/10.3390/s20154212 |
_version_ | 1783572424019673088 |
---|---|
author | Obaidat, Muath Brown, Joseph Obeidat, Suhaib Rawashdeh, Majdi |
author_facet | Obaidat, Muath Brown, Joseph Obeidat, Suhaib Rawashdeh, Majdi |
author_sort | Obaidat, Muath |
collection | PubMed |
description | A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture, breaking the simplicity of the typical client–server model, or fundamental restructuring of the Internet ecosystem; (ii) significant inflation of responsibilities or duties for the user and/or server operator; and (iii) adding increased risks surrounding sensitive data during the authentication process. Many schemes seek to prevent brute-forcing attacks; they often ignore either partially or holistically the dangers of other cyber-attacks such as MiTM or replay attacks. Therefore, there is no incentive to implement such proposals, and it has become the norm instead to inflate current username/password authentication systems. These have remained standard within client–server authentication paradigms, despite insecurities stemming from poor user and server operator practices, and vulnerabilities to interception and masquerades. Besides these vulnerabilities, systems which revolve around secure authentication typically present exploits of two categories; either pitfalls which allow MiTM or replay attacks due to transmitting data for authentication constantly, or the storage of sensitive information leading to highly specific methods of data storage or facilitation, increasing chances of human error. This paper proposes a more secure method of authentication that retains the current structure of accepted paradigms, but minimizes vulnerabilities which result from the process, and does not inflate responsibilities for users or server operators. The proposed scheme uses a hybrid, layered encryption technique alongside a two-part verification process, and provides dynamic protection against interception-based cyber-attacks such as replay or MiTM attacks, without creating additional vulnerabilities for other attacks such as bruteforcing. Results show the proposed mechanism outperforms not only standardized methods, but also other schemes in terms of deployability, exploit resilience, and speed. |
format | Online Article Text |
id | pubmed-7435875 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-74358752020-08-25 A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication Obaidat, Muath Brown, Joseph Obeidat, Suhaib Rawashdeh, Majdi Sensors (Basel) Article A significant percentage of security research that is conducted suffers from common issues that prevent wide-scale adoption. Common snags of such proposed methods tend to include (i) introduction of additional nodes within the communication architecture, breaking the simplicity of the typical client–server model, or fundamental restructuring of the Internet ecosystem; (ii) significant inflation of responsibilities or duties for the user and/or server operator; and (iii) adding increased risks surrounding sensitive data during the authentication process. Many schemes seek to prevent brute-forcing attacks; they often ignore either partially or holistically the dangers of other cyber-attacks such as MiTM or replay attacks. Therefore, there is no incentive to implement such proposals, and it has become the norm instead to inflate current username/password authentication systems. These have remained standard within client–server authentication paradigms, despite insecurities stemming from poor user and server operator practices, and vulnerabilities to interception and masquerades. Besides these vulnerabilities, systems which revolve around secure authentication typically present exploits of two categories; either pitfalls which allow MiTM or replay attacks due to transmitting data for authentication constantly, or the storage of sensitive information leading to highly specific methods of data storage or facilitation, increasing chances of human error. This paper proposes a more secure method of authentication that retains the current structure of accepted paradigms, but minimizes vulnerabilities which result from the process, and does not inflate responsibilities for users or server operators. The proposed scheme uses a hybrid, layered encryption technique alongside a two-part verification process, and provides dynamic protection against interception-based cyber-attacks such as replay or MiTM attacks, without creating additional vulnerabilities for other attacks such as bruteforcing. Results show the proposed mechanism outperforms not only standardized methods, but also other schemes in terms of deployability, exploit resilience, and speed. MDPI 2020-07-29 /pmc/articles/PMC7435875/ /pubmed/32751189 http://dx.doi.org/10.3390/s20154212 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Obaidat, Muath Brown, Joseph Obeidat, Suhaib Rawashdeh, Majdi A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication |
title | A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication |
title_full | A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication |
title_fullStr | A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication |
title_full_unstemmed | A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication |
title_short | A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication |
title_sort | hybrid dynamic encryption scheme for multi-factor verification: a novel paradigm for remote authentication |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7435875/ https://www.ncbi.nlm.nih.gov/pubmed/32751189 http://dx.doi.org/10.3390/s20154212 |
work_keys_str_mv | AT obaidatmuath ahybriddynamicencryptionschemeformultifactorverificationanovelparadigmforremoteauthentication AT brownjoseph ahybriddynamicencryptionschemeformultifactorverificationanovelparadigmforremoteauthentication AT obeidatsuhaib ahybriddynamicencryptionschemeformultifactorverificationanovelparadigmforremoteauthentication AT rawashdehmajdi ahybriddynamicencryptionschemeformultifactorverificationanovelparadigmforremoteauthentication AT obaidatmuath hybriddynamicencryptionschemeformultifactorverificationanovelparadigmforremoteauthentication AT brownjoseph hybriddynamicencryptionschemeformultifactorverificationanovelparadigmforremoteauthentication AT obeidatsuhaib hybriddynamicencryptionschemeformultifactorverificationanovelparadigmforremoteauthentication AT rawashdehmajdi hybriddynamicencryptionschemeformultifactorverificationanovelparadigmforremoteauthentication |