Abstract
In recent years, the development in Information technology has unleashed new challenges and opportunities for new authentication systems and protocols. Authentication ensures that a user is who they claim to be. The trust of authenticity increases exponentially when more factors are involved in the verification process. When security infrastructure makes use of two or more distinct and different category of authentication mechanisms to increase the protection for valid authentication, It is referred to as Strong Authentication or Multifactor Authentication. Multifactor authentication uses combinations of “Something you know,” “Something you have,” “Something you are” and “Somewhere you are”/“Someone you know”, to provide stronger remote authentication than traditional, unreliable single-factor username and password authentication. In this paper we do a survey on the different aspects of multifactor authentication, its need, its techniques and its impact.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Authentication in an Internet Banking Environment, Federal Financial Institutions Examination Council, http://www.ffiec.gov/pdf/authentication_guidance.pdf
Wildstrom, Stephen: Securing Your PC: You’re on Your Own. Business Week, p. 26 (May 26, 2003)
Analysis & Review of FFIEC Multi-Factor Authentication Guidance, Data Risk Governance, http://datariskgovernance.com/risk-assessment/multi-factor-authentication-in-banking/
Multifactor Authentication, Tevora Business Solution Blog, http://blog.tevora.com/authentication/multifactor-authentication-2/
Gpayments, Two-Factor Authentication: An essential guide in the fight against Internet fraud (February 2006)
Sobotka, J., Doležel, R.: Multifactor authentication systems, vol. 1(4) (December 2010) ISSN 1213-1539
Kemshall, A.: Phil Underwood, Options for Two Factor Authentication, White paper by Securenvoy
RSA White paper, RSA SecurID Authenticators (2009), http://www.rsa.com
Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley (2002)
Brianard, John, Ari, J., Rivest, Ronald: Fourth Factor Authentication: Some-body you know (2006), http://www.rsa.com
Davis, J., Orr, T.: A Case for Multi-factor Authentication in Public Key Infrastructure (Spring 2006)
Bhargav, A., Squicciarini, A., Bertino, E.: Privacy Preserving Multi-Factor Authentication with Biometrics
Bhargav-Spantzel, A., Squicciarini, A.C., Bertino, E., Modi, S., Young, M., Elliott, S.J.: Privacy preserving multi-factor authentication with biometrics. J. Comput. Security 15(5), 529–560 (2007)
Fan, C.-I., Lin, Y.-H.: Provably Secure Remote Truly Three-Factor Authenti-cation Scheme with Privacy Protection on Biometrics. IEEE Transactions on Information Forensics and Security 4(4) (December 2009)
Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. IEEE Transactions on Parallel and Distributed Systems 22(8) (August 2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abhishek, K., Roshan, S., Kumar, P., Ranjan, R. (2013). A Comprehensive Study on Multifactor Authentication Schemes. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31552-7_57
Download citation
DOI: https://doi.org/10.1007/978-3-642-31552-7_57
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31551-0
Online ISBN: 978-3-642-31552-7
eBook Packages: EngineeringEngineering (R0)