Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security (original) (raw)

Ensuring Information System Security by Selective Multifactor Authentication / Обеспечение безопасности информационных систем с помощью выборочной многофакторной аутентификации

Регион и мир / Region and the World

Multi-factor Authentication (MFA) has emerged as an important security measure to protect sensitive information and prevent unauthorized access in an increasingly interconnected world. In this article, we introduced the multi-factor authentication system we developed, which is a security mechanism and not only offers multiple authentication methods for users to verify their identity, but does it all in a clearly fixed order, which increases the level of security on vulnerable websites and minimizes the loss of accounts. This toolkit is flexible in its structure and can be used both separately and as an integral system. One of the advantages is that users themselves choose the authentication system and their order. All this slightly complicates the authentication process, but guarantees security from cyber attacks.

A Method of Risk Assessment for Multi-Factor Authentication

User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user authentication methods are also becoming more diversified. This research analyzes user authentication methods being used in various online environments, such as web portals, electronic transactions, financial services and e-government, to identify the characteristics and issues of such authentication methods in order to present a user authentication level system model suitable for different online services. The results of our method are confirmed through a risk assessment and we verify its safety using the testing method presented in OWASP and NIST SP800-63.

Multi-Factor Authentication: A Survey

Cryptography

Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir's Secret Sharing (SSS) scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.

A Study on Three Step Multifactor Authentication System for Modern Security

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

This survey paper reviews all the major factors in validating three-level passwords such as one-factor authentication using passwords and two-factor authentication is not enough to provide better security to the modern digital age with remarkable advances in the field of information technology. Even when single-factor or two-factor authentication was used to secure remote access and the system, hacking tools, were simple computer programs for collecting private keys, as well as private generators have made it difficult to provide security. Security threats based on malware, such as important installed trackers, are always available to improve security risks. This is necessary the use of a safe and easy-to-use object. As a result, Three Level Security is an easy-to-use software. It also proves the use of different techniques used by different authors.

Security of Multifactor Authentication Model to Improve Authentication Systems

Multifactor authentication (MFA) is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction. The goal of MFA is to create a layered defense and make it more difficult for an unauthorized person to access a computer system or network. Multifactor authentication is achieved by combining two or three independent credentials: what the user knows (knowledge-based authentication), what the user has (security token or smart card) and what the user is (biometric verification). Single-factor authentication (SFA), in contrast, only requires knowledge the user possesses. Although passwordbased authentication is well-suited for website or application access, it is not secure enough for online financial transactions.

Enhancing Multi-Factor Authentication in Modern Computing

Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like snooping, sniffing, spoofing and phishing. There is need to curb these problems with the use of an enhanced multi-factor authentication approach. The objective of this work is to create a multi-factor authentication software for a 4G wireless network. Multi-factor authentication involves user's knowledge factor, user's possession factor and user's inherence factor; that is who the user is to be presented before system access can be granted. The research methodologies used for this work include Structured System Analysis and Design Methodology, SSADM and Prototyping. The result of this work will be a Multi-factor authentications software. This software was designed with programming languages like ASP. NET, C# and Microsoft SQL Server for the database.

Multi-Factor Authentication System

2017 International Conference on Research and Innovation in Computer Engineering and Computer Sciences (RICCES'2017), 2017

— Typing in your username and password is usually how one identifies himself to an electronic system offering various services in a process called authentication. That is the most traditional method. Successful repetitive attacks on conventional authentication systems made it necessary to reinvent the wheel and come up with new authentication ideas that increase security while maintaining a satisfactory level of practicality and convenience. This paper discusses the design and implementation of a multi-factor authentication system—that utilizes the layered security concept—and evaluates its simplicity and performance against different types of attacks. The system consists of four different authentication methods or stages; however, only two are required to successfully log into the system. The system randomly selects two of the four stages during the login process. To the best of our knowledge, this is a novel idea that has not been employed before. The first stage makes the user select a pattern of boxes from a grid of boxes. The second stage makes the user select five characters out of ten characters according to a numeric code created at registration. The third stage makes the user enter a passcode based on a seed value by using a secret formula found in the user's smartphone. The fourth stage presents the user with two security questions, out of at least three created at registration, that he must answer. To properly evaluate the system, we run a survey to get opinions of normal users and security professionals. We also evaluate the system mathematically to gauge its immunity against brute-force attacks. The results show that users quickly digested the system, and the probability of a successful brute-force attack is less than 6.72 E-25 for the first and second stages combined if you only select 8 items out of 36, which is the total number of items, or 2.7 E-17 in the specific case of our implementation.

Design and Implementation of Multi Factor Mechanism for Secure Authentication System

A secure network depends in part on user authentication and regrettably the authentication systems currently in use are not completely safe. However, the user is not the only party that needs to be authenticated to ensure the security of transactions on the Internet. Existing OTP mechanism cannot guarantee reuse of user's account by an adversary, re-use stolen user's device which is used in the process of authentication, and non-repudiation. This paper proposed mechanism of multi factor for secure electronic authentication. It intends to authenticate both of user and mobile device and guarantee non-repudiation, integrity of OTP from obtaining it by an adversary. The proposal can guarantee the user’s credentials by ensuring the user’s authenticity of identity and checking that the mobile device is in the right hands before sending the OTP to the user. This would require each user having a unique phone number and a unique mobile device (unique International Mobile Equipment Identity (IMEI)), in addition to an ID card number. By leveraging existing communication infrastructures, the mechanism would be able to guarantee the safety of electronic authentication, and to confirm that it demonstrates excellence in non-repudiation, authenticate user and mobile device which are used in the process of authentication, certification strength and also in comparison and analysis through experimenting with existing OTP mechanisms. https://sites.google.com/site/ijcsis/

A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure

Future Internet

The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authentication towards robustness. User names and associated passwords have been a common practice for long as Single Factor Authentication. However, advancements in the speed of computing and the usage of simple methods, starting from the Brute Force technique to the implementation of advanced and efficient crytographic algorithms, have posed several threats and vulnerabilities for authentication systems, leading to the degradation of their effectiveness. Multi-factor authentication has emerged as a robust means of securing the cloud using simultaneous and multiple means of authentication factors. This employs multiple levels of cascaded authentication checks. This paper covers an extensive and syst...

Vulnerabilities detection using attack recognition technique in multi-factor authentication

TELKOMNIKA Telecommunication Computing Electronics and Control, 2020

Authentication is one of the essentials components of information security. It has become one of the most basic security requirements for network communication. Today, there is a necessity for a strong level of authentication to guarantee a significant level of security is being conveyed to the application. As such, it expedites challenging issues on security and efficiency. Security issues such as privacy and data integrity emerge because of the absence of control and authority. In addition, the bigger issue for multi-factor authentication is on the high execution time that leads to overall performance degradation. Most of existing studies related to multi-factor authentication schemes does not detect weaknesses based on user behavior. Most recent research does not look at the efficiency of the system by focusing only on improving the security aspect of authentication. Hence, this research proposes a new multi-factor authentication scheme that can withstand attacks, based on user behavior and maintaining optimum efficiency. Experiments have been conducted to evaluate this scheme. The results of the experiment show that the processing time of the proposed scheme is lower than the processing time of other schemes. This is particularly important after additional security features have been added to the scheme.