Title Kelių faktorių autentifikavimo mikrovaldikliu algoritmo sudarymas /
Translation of Title Multi-factor authentication using microcontroller algorithm development.
Authors Šlipaitis, Karolis
Full Text Download
Pages 69
Keywords [eng] mulit-factor authentication ; FIDO alliance ; microcontroller ; Arduino platform
Abstract [eng] While technologies rapidly evolve, more and more information is being transferred to the cyberspace. Cyber criminals evolve together with the technologies and they want to steal all the private data, which belongs to the average users. Average users can’t keep up with the technologies and so they become easy targets for the cyber criminals. Average users are being clogged more and more by the password-based authentication. To address this problem, multi-step authentication was introduced. But is it really more secure and easier to use for the average user? To find that out, multi-step authentication ways, techniques and applicability are being analyzed in this work, including standards and solutions offered by the “Fido Alliance”. It was clarified that no method alone is good for all-round solution and every each of them has its benefits and drawbacks. Also, there’s a need for a lot of various devices to be able to authenticate by certain methods. On this basis, it was decided to create universal authenticate mechanism, which could allow to authenticate by several different methods and would have a wide variety of use possibilities. Designed several theoretical authentication models, which could be appropriate for joining in one physical device. “Arduino” platform was chosen for implementation, because it is programmable and it allows to connect many other physical components to it as is designed for beginners and has a huge community. This platform lacks computing power, however it’s enough for basic tasks. “Arduino” allowed successfully implement designed models prototypes and unite them to form one universal mechanism, which allows to choose of many implemented authentication methods. After the research of prototypes, it was clear that they can authenticate from 1 to 100 times (depends on the chosen authentication model) each second and that for smooth working of some models it is required to add the artificial delay in the code, which has a significant impact on throughput decrease.
Dissertation Institution Kauno technologijos universitetas.
Type Master thesis
Language Lithuanian
Publication date 2017