2021 International Conference on Computer Communications and Networks (ICCCN) 2021
DOI: 10.1109/icccn52240.2021.9522319
|View full text |Cite
|
Sign up to set email alerts
|

A novel Two-Factor HoneyToken Authentication Mechanism

Abstract: This paper extends and advances our recently introduced two-factor Honeytoken authentication method by incorporating blockchain technology. This novel approach strengthens the authentication method, preventing various attacks, including tampering attacks. Evaluation results demonstrate that integrating blockchain into the Honeytoken method can enhance performance and efficiency.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…The importance of those methods is to not change the business processes too much, be efficient and also easily applicable to several systems and platforms. A novel method entitled 2FHA (two factor honeytoken authentication mechanism) was recently proposed that combines honeytokens and 2FA in order to offer increased level of security without compromising user friendliness and efficiency [30,31].…”
Section: Discussionmentioning
confidence: 99%
“…The importance of those methods is to not change the business processes too much, be efficient and also easily applicable to several systems and platforms. A novel method entitled 2FHA (two factor honeytoken authentication mechanism) was recently proposed that combines honeytokens and 2FA in order to offer increased level of security without compromising user friendliness and efficiency [30,31].…”
Section: Discussionmentioning
confidence: 99%
“…A Blockchain-based two Factor Honeytoken Authentication System [11]. While the integration of blockchain technology into the two-factor Honeytoken authentication method shows promise in enhancing security, there are notable drawbacks to consider.…”
Section: Breaking Mobile Notification-based Authentication Withmentioning
confidence: 99%
“…To address issues related to password protection, user behaviors that pose threats to sensitive systems, and 2FA mechanisms, the work in [9] aims at providing a high level of security and uninterrupted services while safeguarding systems and users from unau-thorized access to resources and preventing privacy violations and personal information disclosure. By utilizing honeyword principles and incorporating QR codes, which make the implementation platform-independent, this method allows for mobile user access, and the selected strategy seeks to detect and prevent attacks.…”
Section: Related Workmentioning
confidence: 99%