Information Sciences Letters
Abstract
Most authentication schemes are using passwords only to restrict access to services. Which are suffering from many weaknesses, such as key-logger attack and dictionary attack. Also, other authentication schemes are using physical token such as smart cards. These schemes are also impractical due to their infrastructure requirements. Since, many researchers have proposed a various of authentication schemes which rely on a single level security. So it is important to use multi-level security which is implemented especially in sensitive applications. This paper proposes an efficient multi-level user authentication protocol called ”ElDahshan Authentication protocol” based on different authentication methods for each level. Where each level contains different authentication methods with its own privileges.These security levels are managed by an identity Manager. To validate the proposed protocol we applied it for user authentication on two web services such as Content Management System and Online Voting System.
Recommended Citation
A. Elngar, Ahmed; A. ElDahshan, Kamal; Aboshosha, Ashraf; and K. Elsayed, Eman
(2016)
"Employing Multi-Level Authentication Protocol for Securing Intelligent Systems,"
Information Sciences Letters: Vol. 5
:
Iss.
3
, PP -.
Available at:
https://digitalcommons.aaru.edu.jo/isl/vol5/iss3/3