Hello, Guys, My name is Punit Pandey and i am pursuing an MCA and I am also a security expert for securing a network and computer. So, that i am gonna publish some PPT for understanding how to create a layer for security.
In this section, you can learn the introduction of the hardware authentication in a technology.
And it will be covering all the Hardware security-related things I think it is a very helpful for your learning process and easy to understand how to the hardware work.
2. ABSTRACT
From the user perspective, security and efficiency are key to the idea of
authentication. It’s application in multi-server architecture authentication
protocol. user’s login many servers with only one password and one identity. In
2018, We find that above idea could not resist password guessing attack, user
impersonation attack and do not have anonymity. For these concerns, we propose
a multiserver authentication idea based on two-factor, which can raise efficiency
of communication and calculation by reducing unnecessary steps of keys
exchange. In addition, the scheme has higher security which makes up for above-
mentioned security flaws.
3. THEORETICAL FRAMEWORK
SECURITY THREATENS IN DEVICE CAN BE ROUGHLY CATEGORIZED INTO FOUR SECTIONS:
• THIS VULNERABILITY EXPOSES THE THREAT IS GROWING AS AN OPEN PLATFORM.
• DEPENDING ON THE APPLICATION DISTRIBUTION THROUGH THE INTERNET WORLD MALICIOUS VIRUSES
AND OPPORTUNITIES ARE EXPANDING.
• IT SUPPORTS A VARIETY OF NETWORK CONNECTIVITY ENVIRONMENT PROVIDING A MULTIPLICITY OF
INFECTION.
• A RISE OF PRIVATE AND CORPORATE INFORMATION LEAK THREATENS FROM MOBILITY CONVENIENCE
AND MOBILE OFFICE PROGRAM.
There are some security Devices which is available for providing a security:
1. USB authentication token
2. Biometric Device
4. USB SECURITY KEYS
Universal Serial Bus (USB) security keys, also called security tokens, are
small devices that plug into a computer's USB port for authentication. This
adds an extra layer of security, as the user not only must know the system
password, but also must be in possession of the security key.
FIDO U2F
5. FIDO U2F
U2F is an open authentication standard that enables internet users to
securely access any number of online services with one single security key
instantly and with no drivers or client software needed.
6. U2F ADVANTAGES
• Strong security — Strong two-factor authentication using public key crypto that protects against phishing, session
hijacking, man-in-the-middle, and malware attacks.
• Easy to use — Works out-of-the-box thanks to native support in platforms and browsers including Chrome, Opera,
and Mozilla, enabling instant authentication to any number of services. No codes to type or drivers to install.
• High privacy — Allows users to choose, own, and control their online identity. Each user can also opt to have
multiple identities, including anonymous, with no personal information associated with the identity. A U2F Security
Key generates a new pair of keys for every service, and only the service stores the public key. With this approach, no
secrets are shared between service providers, and an affordable U2F Security Key can support any number of
services.
• Multiple choices — Open standards provide flexibility and product choice. Designed for existing phones and
computers, for many authentication modalities, and with different communication methods (USB and NFC).
• Cost-efficient — Users can choose from a range of affordable devices online. Yubico offers free and open source
server software for back-end integration through the Yubico Developer Program.
• Electronic identity — Identity proofing is offered for organizations requiring a higher level of identity assurance.
Through service providers it is possible to bind your U2F Security Key to your real government issued identity.
7. BIOMETRIC AUTHENTICATION
Biometric authentication methods include retina, iris, fingerprint and
finger vein scans, facial and voice recognition, and hand or even earlobe
geometry. The latest phones are adding hardware support for biometrics,
such as Touch ID on the iPhone. Biometric factors may demand an explicit
operation by the user (e.g., scanning a fingerprint), or they may be implicit
(e.g., analyzing the user's voice as they interact with the help desk).
8. FINGER SWIPES
Another common type of hardware authentication involves a device that
reads a user's fingerprint. These devices generally consist of a pad
connected to a computer's USB port via a cable. The user swipes his or her
finger over the pad, which matches the user's fingerprint to an image
stored within the system to grant access.
9. SWIPE TECHNOLOGY THE FUTURE OF
AUTHENTICATION
Authentication might be getting easier for users and harder for
intruders. Because standard text passwords are easy to crack, researchers
have been looking to biometrics such as fingerprints and even gestures to
authenticate users.
10. OPTICAL RECOGNITION
Optical recognition devices are similar to finger swipe devices in that they
add a layer of security based on stored biometric data. These devices
basically are cameras that connect to a computer and scan a user's retina;
the image then is matched to a stored retinal image for authentication.