Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach

Raman Kumar*, Uffe Kock Wiil

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review


Most of the network service providers currently use two-factor authentication for their wireless networks. This exposes the network subscribers to identify theft and user’s data to security threats like snooping, sniffing, spoofing and phishing. There is need to control these problems with the use of an enhanced multi factor authentication approach. The objective of this work is to create a multi-factor authentication software for a wireless network. Multi factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted. Multi factor authentication depends mainly on three factors: (1) Something a user knows, such as a password or PIN (2) Something a user has, such as a key, a card, or another kind of token (3) Something a user is, such as a retina scan, or fingerprint. We may enhance the reliability and security of the authentication mechanism by combining multiple authentication factors into a single model. Multi factor authentication is far better if we use this schema both statically and dynamically. The three factors together provide a much higher confidence in the all prerequisite parameters of cryptography.

Original languageEnglish
Title of host publicationRecent Advances in Computational Intelligence
EditorsRaman Kumar, Uffe Kock Wiil
Place of PublicationHeidelberg
Publication date2019
ISBN (Print)978-3-030-12499-1
ISBN (Electronic)978-3-030-12500-4
Publication statusPublished - 2019
SeriesStudies in Computational Intelligence


  • Authentication and authorization
  • Multifactor authentication
  • One factor
  • Two factor

Fingerprint Dive into the research topics of 'Design and Analysis of an Enhanced Multifactor Authentication Through a Covert Approach'. Together they form a unique fingerprint.

Cite this