Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach

Raman Kumar*, Uffe Kock Wiil

*Kontaktforfatter for dette arbejde

Publikation: Bidrag til bog/antologi/rapport/konference-proceedingBidrag til bog/antologiForskningpeer review

Resumé

Most of the network service providers currently use two-factor authentication for their wireless networks. This exposes the network subscribers to identify theft and user’s data to security threats like snooping, sniffing, spoofing and phishing. There is need to control these problems with the use of an enhanced multi factor authentication approach. The objective of this work is to create a multi-factor authentication software for a wireless network. Multi factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted. Multi factor authentication depends mainly on three factors: (1) Something a user knows, such as a password or PIN (2) Something a user has, such as a key, a card, or another kind of token (3) Something a user is, such as a retina scan, or fingerprint. We may enhance the reliability and security of the authentication mechanism by combining multiple authentication factors into a single model. Multi factor authentication is far better if we use this schema both statically and dynamically. The three factors together provide a much higher confidence in the all prerequisite parameters of cryptography.

OriginalsprogEngelsk
TitelRecent Advances in Computational Intelligence
RedaktørerRaman Kumar, Uffe Kock Wiil
Udgivelses stedHeidelberg
ForlagSpringer
Publikationsdato2019
Sider45-61
ISBN (Trykt)978-3-030-12499-1
ISBN (Elektronisk)978-3-030-12500-4
DOI
StatusUdgivet - 2019
NavnStudies in Computational Intelligence
Vol/bind823
ISSN1860-949X

Fingeraftryk

Authentication
Wireless networks
Cryptography

Citer dette

Kumar, R., & Wiil, U. K. (2019). Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach. I R. Kumar, & U. K. Wiil (red.), Recent Advances in Computational Intelligence (s. 45-61). Heidelberg: Springer. Studies in Computational Intelligence, Bind. 823 https://doi.org/10.1007/978-3-030-12500-4_3
Kumar, Raman ; Wiil, Uffe Kock. / Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach. Recent Advances in Computational Intelligence. red. / Raman Kumar ; Uffe Kock Wiil. Heidelberg : Springer, 2019. s. 45-61 (Studies in Computational Intelligence, Bind 823).
@inbook{b7a74e53f9314c36a034fe4d5aeb163b,
title = "Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach",
abstract = "Most of the network service providers currently use two-factor authentication for their wireless networks. This exposes the network subscribers to identify theft and user’s data to security threats like snooping, sniffing, spoofing and phishing. There is need to control these problems with the use of an enhanced multi factor authentication approach. The objective of this work is to create a multi-factor authentication software for a wireless network. Multi factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted. Multi factor authentication depends mainly on three factors: (1) Something a user knows, such as a password or PIN (2) Something a user has, such as a key, a card, or another kind of token (3) Something a user is, such as a retina scan, or fingerprint. We may enhance the reliability and security of the authentication mechanism by combining multiple authentication factors into a single model. Multi factor authentication is far better if we use this schema both statically and dynamically. The three factors together provide a much higher confidence in the all prerequisite parameters of cryptography.",
keywords = "Authentication and authorization, Multifactor authentication, One factor, Two factor",
author = "Raman Kumar and Wiil, {Uffe Kock}",
year = "2019",
doi = "10.1007/978-3-030-12500-4_3",
language = "English",
isbn = "978-3-030-12499-1",
pages = "45--61",
editor = "Raman Kumar and Wiil, {Uffe Kock}",
booktitle = "Recent Advances in Computational Intelligence",
publisher = "Springer",
address = "Germany",

}

Kumar, R & Wiil, UK 2019, Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach. i R Kumar & UK Wiil (red), Recent Advances in Computational Intelligence. Springer, Heidelberg, Studies in Computational Intelligence, bind 823, s. 45-61. https://doi.org/10.1007/978-3-030-12500-4_3

Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach. / Kumar, Raman; Wiil, Uffe Kock.

Recent Advances in Computational Intelligence. red. / Raman Kumar; Uffe Kock Wiil. Heidelberg : Springer, 2019. s. 45-61 (Studies in Computational Intelligence, Bind 823).

Publikation: Bidrag til bog/antologi/rapport/konference-proceedingBidrag til bog/antologiForskningpeer review

TY - CHAP

T1 - Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach

AU - Kumar, Raman

AU - Wiil, Uffe Kock

PY - 2019

Y1 - 2019

N2 - Most of the network service providers currently use two-factor authentication for their wireless networks. This exposes the network subscribers to identify theft and user’s data to security threats like snooping, sniffing, spoofing and phishing. There is need to control these problems with the use of an enhanced multi factor authentication approach. The objective of this work is to create a multi-factor authentication software for a wireless network. Multi factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted. Multi factor authentication depends mainly on three factors: (1) Something a user knows, such as a password or PIN (2) Something a user has, such as a key, a card, or another kind of token (3) Something a user is, such as a retina scan, or fingerprint. We may enhance the reliability and security of the authentication mechanism by combining multiple authentication factors into a single model. Multi factor authentication is far better if we use this schema both statically and dynamically. The three factors together provide a much higher confidence in the all prerequisite parameters of cryptography.

AB - Most of the network service providers currently use two-factor authentication for their wireless networks. This exposes the network subscribers to identify theft and user’s data to security threats like snooping, sniffing, spoofing and phishing. There is need to control these problems with the use of an enhanced multi factor authentication approach. The objective of this work is to create a multi-factor authentication software for a wireless network. Multi factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted. Multi factor authentication depends mainly on three factors: (1) Something a user knows, such as a password or PIN (2) Something a user has, such as a key, a card, or another kind of token (3) Something a user is, such as a retina scan, or fingerprint. We may enhance the reliability and security of the authentication mechanism by combining multiple authentication factors into a single model. Multi factor authentication is far better if we use this schema both statically and dynamically. The three factors together provide a much higher confidence in the all prerequisite parameters of cryptography.

KW - Authentication and authorization

KW - Multifactor authentication

KW - One factor

KW - Two factor

UR - https://www.springer.com/us/book/9783030124991

U2 - 10.1007/978-3-030-12500-4_3

DO - 10.1007/978-3-030-12500-4_3

M3 - Book chapter

SN - 978-3-030-12499-1

SP - 45

EP - 61

BT - Recent Advances in Computational Intelligence

A2 - Kumar, Raman

A2 - Wiil, Uffe Kock

PB - Springer

CY - Heidelberg

ER -

Kumar R, Wiil UK. Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach. I Kumar R, Wiil UK, red., Recent Advances in Computational Intelligence. Heidelberg: Springer. 2019. s. 45-61. (Studies in Computational Intelligence, Bind 823). https://doi.org/10.1007/978-3-030-12500-4_3