140 likes | 243 Views
A mobile single sign-on system. Master thesis 2006 Mats Byfuglien. Outline. Problem description Project description Research questions Methods Related work The prototype Results Further work Conclusion. Problem description. Most users today have a large number of passwords to manage
E N D
A mobile single sign-on system Master thesis 2006 Mats Byfuglien
Outline Problem description Project description Research questions Methods Related work The prototype Results Further work Conclusion
Problem description Most users today have a large number of passwords to manage This often results in: The passwords are written down Easily guessable passwords are used One password used on multiple accounts This reduces the security passwords provide Secure passwords is still a good authentication mechanism SSO proposed as a way to improve password security
Project description Today there are no mobile SSO solutions on the market supporting automated sign-ins. Develop a functional prototype of a mobile SSO system that handles passwords and supports automatic sign in. A mobile phone with a Java MIDlet handles the management of usernames and passwords Bluetooth/USB unit connected to the PC Conduct a user test Security analysis to find what security measures should be implemented
Research questions 1. What types of single sign-on solutions are available? 2. How secure is the Bluetooth protocol for transferring sensitive data? 3. Is it possible to implement the proposed single sign-on concept? 4. What security mechanisms need to be in place to assure the security of this system? 5. How will this SSO concept be received by the users? 6. Will this SSO concept increase the users’ security level?
Methods Literature study Technical feasibility study Develop the prototype User test Scenario Survey Interview Security analysis Adversary modeling
Other SSO solutions A taxonomy lists 4 main categories: Local pseudo SSO SSO component is on the user's computer Proxy based pseudo SSO The user authenticates once to the proxy and the proxy handles authentication to the services Do not require any changes to the authentication systems True SSO User authenticates to Authentication Service Provider (ASP) once. True SSO solutions are expensive and difficult to configure correctly All systems must support the SSO solution Local true SSO Trused component Proxy based true SSO Kerberos
Resultsfromthe security analysis Four main issues were discovered: Secure the Bluetooth channel Secure protocol on top of Bluetooth protocol Properly authenticate the devices Digital certificates Protect data stored on the mobile phone Encryption Split data on two devices Confirm the integrity of software packages Digitally sign the packages
Results from the user test 28 users participated 26 rated the system above average 19 would like to use the system daily 7 did not have an opinion, 2 would not use it 24 believes the system will improve their password management Everyone wanted a backup solution
Further work Implement the proposed security measures Port the code to a smaller device Implement a backup solution Conduct a detailed security analysis when the security measures are implemented Conduct a large scale user test Allow users to test the system over time Include a largerer number of participants
Conclusion It is possible to implement the SSO concept The system was well received by the users The system will not provide better security then other SSO solutions Mobility and easy to use functionality (no software or drivers needed) makes the system stand out The solution might apeal to a different group then other SSO solutions Will increase the security level of users who manages passwords manually Enables the user to use more secure passwords