Velásquez et al., 2018

Authentication schemes and methods: A systematic literature review

article

Authors

Velásquez, I., Caro, A., Rodríguez, A.

Publication

Information and Software Technology, vol. 94, pages 30-37

Year

2018

Abstract

Context: There is a great variety of techniques for performing authentication, like the use of text passwords or smart cards. Some techniques combine others into one, which is known as multi-factor authentication. There is an interest in knowing existing authentication techniques, including those aimed at multi-factor authentication, and the frameworks that can be found in literature that are used to compare and select these techniques according to different criteria.

Objective: This article aims to gather the existing knowledge on authentication techniques and ways to discern the most effective ones for different contexts.

Method: A systematic literature review is performed in order to gather existing authentication techniques proposed in literature and ways to compare and select them in different contexts. A total of 515 single-factor and 442 multi-factor authentication techniques have been found. Furthermore, 17 articles regarding comparison and selection criteria for authentication techniques and 8 frameworks that help in such a task are discussed.

Results: A great variety of single-factor techniques has been found and smart card-based authentication was shown to be the most researched technique. Similarly, multi-factor techniques combine the different single-factor techniques found and the combination of text-passwords and smart cards is the most researched technique. Usability, security and costs are the most used criteria for comparing and selecting authentication schemes, whereas the context is given an important remark as well. No framework among the ones found analyzed in detail both single-factor and multi-factor authentication techniques for the decision-making process.

Conclusion: The review shows that a vast research has been done for authentication techniques, although its use in some contexts has not been researched as much. The lack of works regarding the comparison and selection of authentication techniques is observed.

(, p. 1)

Citation

Velásquez, I., Caro, A., Rodríguez, A., 2018. Authentication schemes and methods: A systematic literature review. Information and Software Technology 94, 30–37. https://doi.org/10/gcqgk6


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.