Comparative Analysis of Connected and Disconnected Tokens in Enhanced Multi-Factor Authentication

  • 0

Comparative Analysis of Connected and Disconnected Tokens in Enhanced Multi-Factor Authentication

Obioha Iwuoha & Chidiebere C. Oparah


Department of Computer Science  

Federal Polytechnic, Nekede, Owerri, Imo state

Email: ohaobi@yahoo.com, canonchychuks@yahoo.com

Corresponding Author: Obioha Iwuoha

ABSTRACT

The need for provision of security tokens as a possession factor in multi-factor authentication cannot be over-emphasized. But the fact remains that the most secure and adaptive type of token is yet to be known and strictly adhered to. The objective of this paper is to compare the two main types of tokens and determine which is best and most appropriate for defined situations. The data-flow modeling technique of the structured systems analysis and design methodology will be used for this research. It involves the process of identifying, modeling and documenting how data moves around an information system by examining processes, data stores, external entities and data flows of security tokens. The result of this paper is an educative insight and gross understanding of the types of security tokens required during possession factor presentation in enhanced multi-factor authentication.

Keywords: Tokens, disconnected tokens, hard tokens, authentication, key, encryption, user, authentication factors