Learning Centre

Attacks and defenses in user authentication systems: A survey

 |  Login

Show simple item record

dc.contributor Aalto-yliopisto fi
dc.contributor Aalto University en
dc.contributor.author Wang, Xuerui
dc.contributor.author Yan, Zheng
dc.contributor.author Zhang, Rui
dc.contributor.author Zhang, Peng
dc.date.accessioned 2021-08-04T06:38:17Z
dc.date.available 2021-08-04T06:38:17Z
dc.date.issued 2021-08-15
dc.identifier.citation Wang , X , Yan , Z , Zhang , R & Zhang , P 2021 , ' Attacks and defenses in user authentication systems: A survey ' , Journal of Network and Computer Applications , vol. 188 , 103080 . https://doi.org/10.1016/j.jnca.2021.103080 en
dc.identifier.issn 1084-8045
dc.identifier.other PURE UUID: 06353e47-d830-4512-8b05-243836bfb7f3
dc.identifier.other PURE ITEMURL: https://research.aalto.fi/en/publications/06353e47-d830-4512-8b05-243836bfb7f3
dc.identifier.other PURE LINK: http://www.scopus.com/inward/record.url?scp=85110472100&partnerID=8YFLogxK
dc.identifier.other PURE FILEURL: https://research.aalto.fi/files/66253694/ELEC_Wang_UserAuthenticationSurvey_JNCA.pdf
dc.identifier.uri https://aaltodoc.aalto.fi/handle/123456789/108825
dc.description Funding Information: This work was supported in part by the National Natural Science Foundation of China under Grant 62072351 ; in part by the Academy of Finland under Grant 308087 and Grant 335262 ; in part by the Shaanxi Innovation Team Project under Grant 2018TD-007 ; and in part by the 111 Project under Grant B16037 . Publisher Copyright: © 2021 Elsevier Ltd
dc.description.abstract User authentication systems (in short authentication systems) have wide utilization in our daily life. Unfortunately, existing authentication systems are prone to various attacks while both system security and usability are expected to be satisfied. But the current research still lacks a thorough survey on various types of attacks and corresponding countermeasures regarding user authentication, including traditional password-based and emerging biometric-based systems. In this paper, we make a comprehensive review on attacks and defenses of the authentication systems. We firstly introduce a number of common attacks by classifying them into different categories based on attacker knowledge, attack target, attack form and attack strength. Then, we propose a set of evaluation criteria for evaluating different kinds of attack defense mechanisms. Furthermore, we review and evaluate the existing methods of detecting and resisting attacks in the authentication systems by employing the proposed evaluation criteria as acommon measure. Specifically, we focus on comparing and analyzing the performance of different defense mechanisms in different types of authentication systems. Through serious review and analysis, we put forward a number of open issues and propose some promising future research directions, hoping to inspire further research in this field. en
dc.format.extent 21
dc.format.mimetype application/pdf
dc.language.iso en en
dc.publisher Academic Press Inc.
dc.relation.ispartofseries Journal of Network and Computer Applications en
dc.relation.ispartofseries Volume 188 en
dc.rights openAccess en
dc.title Attacks and defenses in user authentication systems: A survey en
dc.type A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä fi
dc.description.version Peer reviewed en
dc.contributor.department Xidian University
dc.contributor.department Department of Communications and Networking
dc.contributor.department State Key Laboratory of ISN
dc.contributor.department Zalando SE
dc.subject.keyword Attack detection
dc.subject.keyword Authentication system
dc.subject.keyword Biometric authentication
dc.subject.keyword CAPTCHA
dc.subject.keyword Deep neural networks
dc.subject.keyword Defense mechanisms
dc.subject.keyword Liveness detection
dc.subject.keyword Machine learning
dc.subject.keyword Spoofing attack
dc.identifier.urn URN:NBN:fi:aalto-202108048069
dc.identifier.doi 10.1016/j.jnca.2021.103080
dc.date.embargo info:eu-repo/date/embargoEnd/2023-06-01

Files in this item

Files Size Format View

There are no open access files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search archive

Advanced Search

article-iconSubmit a publication