RSA security's official guide to cryptography
RSA security's official guide to cryptography
Authentication: from passwords to public keys
Authentication: from passwords to public keys
SSH, The Secure Shell: The Definitive Guide
SSH, The Secure Shell: The Definitive Guide
Hi-index | 0.00 |
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans network (intercommunicate) continually with wireless devices. In this paper, we propose a new RFID-based wireless authentication system, not yet implemented, called "AuthenLink" designed for mobile devices, coupled with a new approach to distinguishing characteristics to authenticate people (authentication factor): something you CONVEY. The utmost purpose of this paper is to provide an ease, user-centred and acceptable security authentication system especially against fraud, counterfeit, and theft for the wireless domain (cellular phones and personal digital assistants PDAs). Our authentication system achieves its goal through a microprocessor chip (ChipTag) computer implanted under human skin. This Chip Tag is able to authenticate user's access to systems, connect them wirelessly, through the Radio Frequency Identification (RFID) technology [5], and also enable mobile users to perform mobile transactions.