Browse > Article
http://dx.doi.org/10.15207/JKCS.2019.10.7.007

Multiple Method Authentication System Using Embedded Device  

Jeong, Pil-Seong (Dept. of Information Technology Communication, Myongji College)
Cho, Yang-Hyun (Division of Computer & Mechatronics Engineering, Sahmyook University)
Publication Information
Journal of the Korea Convergence Society / v.10, no.7, 2019 , pp. 7-14 More about this Journal
Abstract
Users who use smartphone can using knowledge-based authentication, possession-based authentication, biometric-based authentication, and token-based authentication in order to access rights to systems requiring authentication. However, desktop computer users use method only ID and password, which are knowledge-based authentication factors, due to limitations of authentication devices, despite various authentication methods. In this paper, we designed and implemented a raspberry pi based authentication system that provides multiple authentication method of a user's desired type. The implementation system uses knowledge-based authentication, possessive-based authentication, biometric-based authentication, and token-based authentication. The proposed system can provide a security function that can be used by SMEs, which is difficult to hire a security officer due to the economic burden. The implemented system can be used not only for personal use but also for enterprise, and it can be applied to various fields such as finance and game.
Keywords
User Authentication; Authentication System; Information Security; Raspberry Pi; Embedded System;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 J. W. Jung, J. D. Kim, M. G. Song & C. G. Jin. (2015). A study on Development of Certification Schemes for Cloud Security, The Journal of digital policy & management, 13(8), 43-49. DOI: 10.14400/JDC.2015.13.8.43
2 S. H. Hong. (2012). New Authentication Methods based on User's Behavior Big Data Analysis on Cloud, Journal of Convergence for Information Technology, 2(2), 35-41. DOI: 10.22156/CS4SMB.2016.6.4.031   DOI
3 M. K. Choi, T. C. Kwan & D. H. Lee. (2013). Analysis of Security Vulnerability in Home Trading System, and its Countermeasure using Cell phone, Journal of The Korea Institute of Information Security and Cryptology, 23(1), 19-32. DOI: 10.13089/jkiisc.2013.23.1.019   DOI
4 S. J. Kim. (2010). Information Security Plan on Cloud Computing - Information Security Management System, Korean Review of Management Consulting, 1(2), 194- 208.
5 H. T. Chae & S. J. Lee. (2014). Security Policy Proposals through PC Security Solution Log Analysis - Prevention Leakage of Personal Information, Journal of the Korea Institute of Information Security & Cryptology, 24(5), 961-968. DOI: 10.13089/jkiisc.2014.24.5.961   DOI
6 D. R. Kim. (2015). A Study on the OTP Generation Algorithm for User Authentication, The Journal of digital policy & management, 13(1), 283-288. DOI: 10.14400/JDC.2015.13.1.283
7 S. H. Lee. (2014). User Authentication Using Biometrics and OTP in Mobile Device, Journal of Convergence for Information Technology, 4(3), 85-90.
8 T. K. Lee, Y. H. Kim & E. G. Im. (2017). Biometric User Authentication Method of Mobile Appilication in Trustable Space, Journal of The Korea Institute of Information Security and Cryptology, 27(2), 201-212. DOI: 10.13089/jkiisc.2017.27.2.201   DOI
9 J. S. Kim, S. J. Lee, B. S. Kim & S. W. Lee. (2015). Standardization trend of non-face authentication technology based on telebio recognition, Journal of The Korea Institute of Information Security and Cryptology, 25(4), 43-50.
10 Y. J. Lee, Y. E. Ku & T. K. Kwon. (2019). A Study of User Perception on Features Used in Behavior-Based Authentication, Journal of the Korea Institute of Information Security & Cryptology, 29(1), 127-137.   DOI
11 Raspberry Pi Foundation. (2019). Raspberry Pi. Raspberry Pi [Online]. https://www.raspberrypi.org
12 Y. J. Shin. (2017). A Study on the Personal Information Protection for Improvement of Personal Identification - Focusing on the Alternative Means of Resident Number for Users, Journal of Korean Associastion for Regional Information Society, 20(2), 1-24.
13 S. H. Yun. (2016). The Biometric Authentication based Dynamic Group Signature Scheme, Journal of the Korea Convergence Society, 7(1), 49-55. DOI: 10.15207/jkcs.2016.7.1.049   DOI
14 M. G. Lee, Do. W. Kim & J. S. Shon. (2012). Active Authentication Method using NFC, The Journal of Korean Institute of Communications and Information Sciences, 37(2), 140-156.   DOI
15 C. O. Kang, J. J. Won, S. J. Park & J. C. Ryou. (2013). Efficient File System Level Encryption Mechanism Using HSM, Journal of the Korea Institute of Information Security and Cryptology, 23(5), 849-858. DOI: 10.13089/jkiisc.2013.23.5.849   DOI
16 S. Balaban. (2015). Deep learning and face recognition: the state of the art, Biometric and Surveillance Technology for Human and Activity Identification XII, 1-9 DOI: 10.1117/12.2181526