Abstract

With the extension in computer networks, there has been a drastic change in the disposition of network security. Security has always been a major concern of any organization as it involves mechanisms to ensure reliable access. In the present era of global electronic connectivity where hackers, eavesdroppers, electronic frauds, viruses are growing in number, security has proved to be indispensable. Although numerous solutions have been put forth in literature to guarantee security, they have botched with related traits like efficiency and scalability. Despite the range of security solutions that have been presented by experts, not a single approach has been wholly agreed upon to provide absolute security or standardized upon unanimously. Furthermore, these approaches lack adoptable user implementation. In this paper, various approaches and techniques that were introduced in the past for the purpose of enhancing the authentication and authorization of the user while performing sensitive and confidential transaction are discussed. Each of works performed by the researchers is taken single-handedly for debate followed by analysis. Finally, the open issues in the current domain of study are formulated from the review conducted.

Highlights

  • Access management includes diverse ways a user can gain access to an identity and the various technologies that offer protection to that identity

  • Security is a serious concern in the present day scenario in sectors like educational institutions, governmental applications, financial institutions, military organization, etc., it needs to be ensured that the security measures should be user ergonomic and adoptable

  • The paper presents the explicit discussion of the prior research works introduced in the past for the purpose of incorporating secure authentication and authorization for any legitimate members attempting to perform secure transactions

Read more

Summary

INTRODUCTION

Access management includes diverse ways a user can gain access to an identity and the various technologies that offer protection to that identity. The access to an identity by the right user at the right time is taken care of in Access Management [1]. Access management in public and private networks is a serious concern in the field of Information Technology. Security is a serious concern in the present day scenario in sectors like educational institutions, governmental applications, financial institutions, military organization, etc., it needs to be ensured that the security measures should be user ergonomic and adoptable. A security system relies on Access Management that is found to be the first checkpoint in network security [5]

Authentication and Authorization
OTP Generation and Distribution
RELATED WORK
Review of OTP Based Schemes
RESULT
LIMITATIONS
Review of Non-OTP Based Schemes
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call