Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach

Raman Kumar*, Uffe Kock Wiil

*Kontaktforfatter for dette arbejde

Publikation: Kapitel i bog/rapport/konference-proceedingKapitel i bogForskningpeer review

Abstrakt

Most of the network service providers currently use two-factor authentication for their wireless networks. This exposes the network subscribers to identify theft and user’s data to security threats like snooping, sniffing, spoofing and phishing. There is need to control these problems with the use of an enhanced multi factor authentication approach. The objective of this work is to create a multi-factor authentication software for a wireless network. Multi factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted. Multi factor authentication depends mainly on three factors: (1) Something a user knows, such as a password or PIN (2) Something a user has, such as a key, a card, or another kind of token (3) Something a user is, such as a retina scan, or fingerprint. We may enhance the reliability and security of the authentication mechanism by combining multiple authentication factors into a single model. Multi factor authentication is far better if we use this schema both statically and dynamically. The three factors together provide a much higher confidence in the all prerequisite parameters of cryptography.

OriginalsprogEngelsk
TitelRecent Advances in Computational Intelligence
RedaktørerRaman Kumar, Uffe Kock Wiil
UdgivelsesstedHeidelberg
ForlagSpringer
Publikationsdato2019
Sider45-61
ISBN (Trykt)978-3-030-12499-1
ISBN (Elektronisk)978-3-030-12500-4
DOI
StatusUdgivet - 2019
NavnStudies in Computational Intelligence
Vol/bind823
ISSN1860-949X

Fingeraftryk Dyk ned i forskningsemnerne om 'Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach'. Sammen danner de et unikt fingeraftryk.

Citationsformater