Comparative Analysis of Connected and Disconnected Tokens in Enhanced Multi-Factor Authentication
Obioha Iwuoha & Chidiebere C. Oparah
Department of Computer Science
Federal Polytechnic, Nekede, Owerri, Imo state
Email: ohaobi@yahoo.com, canonchychuks@yahoo.com
Corresponding Author: Obioha Iwuoha
ABSTRACT
The need for provision of security tokens as a possession factor in multi-factor authentication cannot be over-emphasized. But the fact remains that the most secure and adaptive type of token is yet to be known and strictly adhered to. The objective of this paper is to compare the two main types of tokens and determine which is best and most appropriate for defined situations. The data-flow modeling technique of the structured systems analysis and design methodology will be used for this research. It involves the process of identifying, modeling and documenting how data moves around an information system by examining processes, data stores, external entities and data flows of security tokens. The result of this paper is an educative insight and gross understanding of the types of security tokens required during possession factor presentation in enhanced multi-factor authentication.
Keywords: Tokens, disconnected tokens, hard tokens, authentication, key, encryption, user, authentication factors