@inbook{b7a74e53f9314c36a034fe4d5aeb163b,
title = "Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach",
abstract = "Most of the network service providers currently use two-factor authentication for their wireless networks. This exposes the network subscribers to identify theft and user{\textquoteright}s data to security threats like snooping, sniffing, spoofing and phishing. There is need to control these problems with the use of an enhanced multi factor authentication approach. The objective of this work is to create a multi-factor authentication software for a wireless network. Multi factor authentication involves user{\textquoteright}s knowledge factor, user{\textquoteright}s possession factor and user{\textquoteright}s inherence factor; that is who the user is to be presented before system access can be granted. Multi factor authentication depends mainly on three factors: (1) Something a user knows, such as a password or PIN (2) Something a user has, such as a key, a card, or another kind of token (3) Something a user is, such as a retina scan, or fingerprint. We may enhance the reliability and security of the authentication mechanism by combining multiple authentication factors into a single model. Multi factor authentication is far better if we use this schema both statically and dynamically. The three factors together provide a much higher confidence in the all prerequisite parameters of cryptography.",
keywords = "Authentication and authorization, Multifactor authentication, One factor, Two factor",
author = "Raman Kumar and Wiil, {Uffe Kock}",
year = "2019",
doi = "10.1007/978-3-030-12500-4_3",
language = "English",
isbn = "978-3-030-12499-1",
series = "Studies in Computational Intelligence",
publisher = "Springer",
pages = "45--61",
editor = "Raman Kumar and Wiil, {Uffe Kock}",
booktitle = "Recent Advances in Computational Intelligence",
address = "Germany",
}