Honeyword-based Authentication Techniques for Protecting Passwords: A Survey

8Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

Honeyword (or decoy password) based authentication, first introduced by Juels and Rivest in 2013, has emerged as a security mechanism that can provide security against server-side threats on the password-files. From the theoretical perspective, this security mechanism reduces attackers' efficiency to a great extent as it detects the threat on a password-file so that the system administrator can be notified almost immediately as an attacker tries to take advantage of the compromised file. This paper aims to present a comprehensive survey of the relevant research and technological developments in honeyword-based authentication techniques. We cover twenty-three techniques related to honeyword, reported under different research articles since 2013. This survey paper helps the readers to (i) understand how honeyword based security mechanism works in practice, (ii) get a comparative view on the existing honeyword based techniques, and (iii) identify the existing gaps that have yet to be filled and the emergent research opportunities.

Cite

CITATION STYLE

APA

Chakraborty, N., Li, J., Leung, V. C. M., Mondal, S., Pan, Y., Luo, C., & Mukherjee, M. (2023). Honeyword-based Authentication Techniques for Protecting Passwords: A Survey. ACM Computing Surveys, 55(8). https://doi.org/10.1145/3552431

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free