[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Comprehensive Study on Multifactor Authentication Schemes

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 177))

Abstract

In recent years, the development in Information technology has unleashed new challenges and opportunities for new authentication systems and protocols. Authentication ensures that a user is who they claim to be. The trust of authenticity increases exponentially when more factors are involved in the verification process. When security infrastructure makes use of two or more distinct and different category of authentication mechanisms to increase the protection for valid authentication, It is referred to as Strong Authentication or Multifactor Authentication. Multifactor authentication uses combinations of “Something you know,” “Something you have,” “Something you are” and “Somewhere you are”/“Someone you know”, to provide stronger remote authentication than traditional, unreliable single-factor username and password authentication. In this paper we do a survey on the different aspects of multifactor authentication, its need, its techniques and its impact.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 199.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 249.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Authentication in an Internet Banking Environment, Federal Financial Institutions Examination Council, http://www.ffiec.gov/pdf/authentication_guidance.pdf

  2. Wildstrom, Stephen: Securing Your PC: You’re on Your Own. Business Week, p. 26 (May 26, 2003)

    Google Scholar 

  3. Analysis & Review of FFIEC Multi-Factor Authentication Guidance, Data Risk Governance, http://datariskgovernance.com/risk-assessment/multi-factor-authentication-in-banking/

  4. Multifactor Authentication, Tevora Business Solution Blog, http://blog.tevora.com/authentication/multifactor-authentication-2/

  5. Gpayments, Two-Factor Authentication: An essential guide in the fight against Internet fraud (February 2006)

    Google Scholar 

  6. Sobotka, J., Doležel, R.: Multifactor authentication systems, vol. 1(4) (December 2010) ISSN 1213-1539

    Google Scholar 

  7. Kemshall, A.: Phil Underwood, Options for Two Factor Authentication, White paper by Securenvoy

    Google Scholar 

  8. http://www.otptoken.com/

  9. http://www.ndkey.com.cn/otp_tech_introduction.html

  10. RSA White paper, RSA SecurID Authenticators (2009), http://www.rsa.com

  11. Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley (2002)

    Google Scholar 

  12. Brianard, John, Ari, J., Rivest, Ronald: Fourth Factor Authentication: Some-body you know (2006), http://www.rsa.com

  13. Davis, J., Orr, T.: A Case for Multi-factor Authentication in Public Key Infrastructure (Spring 2006)

    Google Scholar 

  14. Bhargav, A., Squicciarini, A., Bertino, E.: Privacy Preserving Multi-Factor Authentication with Biometrics

    Google Scholar 

  15. Bhargav-Spantzel, A., Squicciarini, A.C., Bertino, E., Modi, S., Young, M., Elliott, S.J.: Privacy preserving multi-factor authentication with biometrics. J. Comput. Security 15(5), 529–560 (2007)

    Google Scholar 

  16. Fan, C.-I., Lin, Y.-H.: Provably Secure Remote Truly Three-Factor Authenti-cation Scheme with Privacy Protection on Biometrics. IEEE Transactions on Information Forensics and Security 4(4) (December 2009)

    Google Scholar 

  17. Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. IEEE Transactions on Parallel and Distributed Systems 22(8) (August 2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kumar Abhishek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abhishek, K., Roshan, S., Kumar, P., Ranjan, R. (2013). A Comprehensive Study on Multifactor Authentication Schemes. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31552-7_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31552-7_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31551-0

  • Online ISBN: 978-3-642-31552-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics