Authentication methods review: how to enhance identity trust in authentication

A great variety of methods which perform authentication have been introduced in information systems over the years, spanning from using simple text passwords to applying complex biometric authentication techniques. All those methods try to corroborate a digital identity that requests access to or se...

Full description

Saved in:
Bibliographic Details
Main Authors: Patmanidou, Eleni, Tsilikas, Ioannis, Πατμανίδου, Ελένη, Τσιλήκας Ιωάννης
Other Authors: Καρύδα, Μαρία
Language:English
Published: 2019
Subjects:
Online Access:http://hdl.handle.net/11610/18814
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A great variety of methods which perform authentication have been introduced in information systems over the years, spanning from using simple text passwords to applying complex biometric authentication techniques. All those methods try to corroborate a digital identity that requests access to or services from an Information System. The growing need to shield Information Technology systems and services from malicious use has encouraged research in the field and manifested an interest in knowing the existing methods as well as the proposed combinations, referred as multi-factor authentication techniques, in order to improve the identity trust. It seems that, given the variety of information systems and the evolution of user experience, no single authentication method is a clear winner in the battle of identity trust in authentication. The designer of an information system should weight regulatory obligations, marketing needs, cost and technology maturity in order to make an authentication compromise. This work shows that significant research has been done on authentication techniques. Nevertheless, so far, there is no definite authentication pattern which can be hailed as optimum, leading from identity corroboration to identity authentication. Therefore, there still thrives an ever-challenging field for scientists and technology industries for compromises and evolution.