Show simple item record

dc.contributor.supervisorFurnell, Steven
dc.contributor.authorCrume, Jeffery
dc.contributor.otherSchool of Engineering, Computing and Mathematicsen_US
dc.date.accessioned2019-05-17T14:11:41Z
dc.date.available2019-05-17T14:11:41Z
dc.date.issued2019
dc.date.issued2019
dc.identifier10635246en_US
dc.identifier.urihttp://hdl.handle.net/10026.1/14108
dc.description.abstract

In order for online systems to transact business or exchange other sensitive information, there must be an environment where the parties involved can verify that the other is who they claim to be. Authentication mechanisms provide this verification process, thereby, improving confidence in the confidentiality and integrity of communications.

However, attackers can exploit this trust if they are able to successfully impersonate a legitimate user and gain access to the system with all the rights and privileges of that user. One particularly difficult class of attacks of this sort involves an attacker inserting themselves between the end user and the system they are communicating with. This man-in-the-middle (MITM) scenario affords the attacker access to passwords, transaction details and other sensitive information, which they may then modify or use to suit their purposes resulting in identity theft, information compromise and misappropriation of funds via electronic transfer, among other scenarios.

Current solutions are able to mitigate some of this risk, but more work is needed here given the difficulty in detecting MITM attacks. This thesis deals generally with the subject of identity and access management with a specific focus in the area of authentication within an IT system.

The research described here provide new approaches to user-centric and transaction-centric authentication as well as capabilities to improve support for the broader authentication system. The first category of user-centric improvements involves mechanisms which: - leverage a communications side channel so that the user can know with greater certainty that the website they are interacting with is the one they intend, - allow a service provider to detect a MITM by determining the user’s geographical location is consistent across multiple channels, - allow for the detection of a MITM through an out of band voice prompt presented to the user and - improve confidence that a user is who they claim to be by dynamically verifying that they are geographically where they are expected to be even when traveling.

The second category of transaction-centric improvements involves mechanisms which leverage out of band communications to verify transaction details have not been tampered with through: - a voice call in which transaction amounts, accounts, etc. are read aloud to the user for confirmation and - a specially constructed QR code which contains these details and can be verified with a purpose-built mobile app.

The third category of broader authentication system support mechanisms which: - detect a MITM attack by recognizing changes in login traffic patterns, - detect rogue domain name service providers which might attempt to redirect traffic to attacker websites, - allow for non-disruptive, secure migration of users across authentication systems and - allow for a secure means to regain access to a mobile device for which the passcode has been lost.

This research consists of a body of published works, most of which have taken the form of patent filings, which have been peer reviewed and granted by the US Patent and Trademark Office.

en_US
dc.language.isoen
dc.publisherUniversity of Plymouth
dc.subjectIdentity
dc.subjectIdentity Management
dc.subjectAccess Control
dc.subjectCybersecurity
dc.subjectMan-in-the-Middle
dc.subjectAuthenticationen_US
dc.subject.classificationPhDen_US
dc.titleAdvancing User Authentication and Access Managementen_US
dc.typeThesis
plymouth.versionpublishableen_US
dc.identifier.doihttp://dx.doi.org/10.24382/1168
dc.rights.embargoperiodNo embargoen_US
dc.type.qualificationDoctorateen_US
rioxxterms.versionNA


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV