Abstract

Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS) scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.

Highlights

  • The continuous growth in the numbers of smart devices and related connectivity loads has impacted mobile services seamlessly offered anywhere around the globe [1]

  • Biometric authentication requires an integration of new services and devices that results in the need for additional education during adoption, which becomes more complicated for seniors and due to related understandability concerns

  • For the Multi-Factor Authentication (MFA) framework, we assume two possible decisions made during the user authentication phase, as it is displayed in Figure 8: (i) H0 —the user is not legitimate; or (ii) H1 —the user is legitimate

Read more

Summary

Introduction

The continuous growth in the numbers of smart devices and related connectivity loads has impacted mobile services seamlessly offered anywhere around the globe [1]. The user has to provide a physical token (a card) representing the ownership factor and support it with a PIN code representing the knowledge factor to be able to access a personal account and withdraw money This system could be made more complex by adding the second channel like, for example, a one-time password to be entered after both the card and the user password were presented [39,40]. One of the main MFA challenges is the absence of correlation between the user identity and the identities of smart sensors within the electronic device/system [59] Regarding security, this relationship must be established so that only the legitimate operator, e.g., the one whose identity is authenticated in advance, can gain the access rights [60,61]. A discussion on the potential evaluation methodology is provided; the vision of the future of MFA is discussed (Section 5)

State-of-the-Art and Potential MFA Sources
Password Protection
Token Presence
Voice Biometrics
Facial Recognition
Ocular-Based Methodology
Hand Geometry
Vein Recognition
Fingerprint Scanner
Thermal Image Recognition
2.1.10. Geographical Location
Future of MFA Integration
Behavior Detection
Beam-Forming Techniques
DNA Recognition
MFA Operation Challenges
Usability
Integration
Security and Privacy
Robustness to Operating Environment
Enabling Flexible MFA Operation
Conventional Approach
Proposed Reversed Methodology
Proposed MFA Solution for V2X Applications
Factor Mismatch
Cloud Assistance
Potential Evaluation Techniques
Strict Decision Methodology
Probabilistic Decision Methodology
Evaluation
Discussion and Future
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.