Authentication systems: a literature review and classification

One of the most important parts of any system is authentication. Appreciated as the first and the last line of defense in the great majority of cases, authentication systems can usually prevent the kleptomaniac from unauthorized accessing to users’ data. However, the traditional text-based password...

Full description

Saved in:
Bibliographic Details
Main Authors: Barkadehi, Mohammadreza Hazhirpasand, Nilashi, Mehrbaksh, Ibrahim, Othman, Fardi, Ali Zakeri, Samad, Sarminah
Format: Article
Published: Elsevier Ltd. 2018
Subjects:
Online Access:http://eprints.utm.my/id/eprint/84209/
https://doi.org/10.1016/j.tele.2018.03.018
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:One of the most important parts of any system is authentication. Appreciated as the first and the last line of defense in the great majority of cases, authentication systems can usually prevent the kleptomaniac from unauthorized accessing to users’ data. However, the traditional text-based password is still used in many websites and applications which are vulnerable to different kinds of attacks. Accordingly, there exist some other alternative ways to boost this traditional method. In this study, we classified and identified different types of authentication systems in a variety of platforms. Their usage, similarity, usability, performance and drawbacks were discussed. The goal of this study is to provide useful, classified information with the aim of understanding of how different authentication systems work and of what their usability and drawbacks are to the readers.