Skip to main content

Adaptive Multi-factor Authentication

Bring dynamicity in multi-factor authentication process

  • Chapter
  • First Online:
Advances in User Authentication

Part of the book series: Infosys Science Foundation Series ((ISFSASE))

Abstract

With the advancements of modern technology, most user activities rely upon various online services, which need to be trusted and secured to prevent the thorny issue of illegal access. Authentication is the primary defense to address the growing need of authentications, though a single-factor (user id and password, for example) is suffering from some significant pitfalls as mentioned in earlier chapters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rouse M (2015) Multifactor authentication (MFA). Available: http://searchsecurity.techtarget.com/definition/multifactorauthentication-MFA, Mar 2015

  2. Strom D (2014) Multifactor authentication examples and business case scenarios. Available: http://searchsecurity.techtarget.com/feature/The-fundamentals-of-MFA-The-business-case-for-multifactor-authentication, Oct 2014

  3. Niinuma K, Jain AK (2010) Continuous user authentication using temporal information. In: SPIE defense, security, and sensing. International Society for Optics and Photonics, pp 76 670L–76 670L

    Google Scholar 

  4. Fathy ME, Patel VM, Yeh T, Zhang Y, Chellappa R, Davis LS (2014) Screen-based active user authentication. Pattern Recogn Lett 42:122–127

    Google Scholar 

  5. Primo A, Phoha VV, Kumar R, Serwadda A (2014) Context-aware active authentication using smartphone accelerometer measurements. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 98–105

    Google Scholar 

  6. Vielhauer C (2005) Biometric user authentication for IT security: from fundamentals to handwriting, vol 18. Springer Science & Business Media, Berlin

    Google Scholar 

  7. Nag AK, Dasgupta D, Deb K (2014) An adaptive approach for active multi-factor authentication. In: 9th annual symposium on information assurance (ASIA14), p 39

    Google Scholar 

  8. Nag AK, Dasgupta D (2014) An adaptive approach for continuous multi-factor authentication in an identity eco-system. In: ACM proceedings of the 9th annual cyber and information security research conference, pp 65–68

    Google Scholar 

  9. Nag AK, Roy A, Dasgupta D (2015) An adaptive approach towards the selection of multi-factor authentication. In: IEEE symposium series on computational intelligence, pp 463–472

    Google Scholar 

  10. Dasgupta D, Nag AK, Roy A (2016) Adaptive multi-factor authentication system. U.S. Patent Application No. 14/968, 676, Dec 2016

    Google Scholar 

  11. Duc NM, Minh BQ (2009) Your face is not your password face authentication bypassing lenovo–asus–toshiba. Black Hat Briefings

    Google Scholar 

  12. Hwang S, Lee H, Cho S (2006) Improving authentication accuracy of unfamiliar passwords with pauses and cues for keystroke dynamics-based authentication. In: Intelligence and security informatics. Springer, Berlin, pp 73–78

    Google Scholar 

  13. Hoog A (2016) SMS two-factor authentication security NIST statement on sms-based two-factor authentication: Whats it mean for CISOs? NowSecure, July 2016. Available: https://www.nowsecure.com/blog/2016/07/31/nist-statementon-sms-based-two-factor-authentication-what-s-it-mean-for-cisos/

  14. Balaban D (2013) Understanding CAPTCHA-solving services in an economic context 3: evaluation of the human-based services, Mar 2013

    Google Scholar 

  15. Nag AK, Roy A, Dasgupta D (2015) An adaptive approach towards the selection of multi-factor authentication. IEEE symposium series on computational intelligence (SSCI), pp 463–472

    Google Scholar 

  16. Dasgupta D, Roy A, Nag Abhijit (2016) Toward the design of adaptive selection strategies for multi-factor authentication. Comput Secur 63:85–116

    Google Scholar 

  17. Griva I, Nash SG, Sofer A (2009) Linear and nonlinear optimization. SIAM

    Google Scholar 

  18. Arduino mega 2560 (2016) Available: https://www.arduino.cc/en/Main/arduinoBoardMega2560

  19. Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: IEEE proceedings computer society conference on computer vision and pattern recognition (CVPR), pp 586–591

    Google Scholar 

  20. Jiang XY, Wong HS, Zhang D (2006) Face recognition based on 2D Fisherface approach. Pattern Recogn 39(4):707–710

    Google Scholar 

  21. Belhumeur PN, Hespanha JP, Kriegman DJ (1997) Eigenfaces versus Fisherfaces: recognition using class specific linear projection. IEEE Trans Pattern Anal Mach Intell 19(7):711–720

    Google Scholar 

  22. Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037–2041

    Google Scholar 

  23. Ratha NK, Chen S, Jain AK (1995) Adaptive flow orientation-based feature extraction in fingerprint images. Pattern Recogn 28(11):1657–1672

    Google Scholar 

  24. Vazan R (2009) Source AFIS—fingerprint recognition library for .net and experimentally for java

    Google Scholar 

  25. Jiang X, Yau WY (2000) Fingerprint minutiae matching based on the local and global structures. In: 15th international conference on pattern recognition. Proceedings, vol 2, pp 1038–1041

    Google Scholar 

  26. Medina-P´erez MA, Garcίa-Borroto M, Gutierrez-Rodr´ıguez AE, Altamirano-Robles L (2012) Improving fingerprint verification using minutiae triplets. Sensors 12(3):3418–3437

    Google Scholar 

  27. Davis S, Mermelstein P (1980) Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences. IEEE Trans Acoust Speech Signal Process 28(4):357–366

    Google Scholar 

  28. Hermansky H (1990) Perceptual linear predictive (PLP) analysis of speech. J Acoust Soc Am 87(4):1738–1752

    Google Scholar 

  29. Adami AG, Mihaescu R, Reynolds DA, Godfrey JJ (2003) Modeling prosodic dynamics for speaker recognition. In: Proceedings of IEEE international conference on acoustics, speech, and signal processing, vol 4, pp IV–788

    Google Scholar 

  30. Muda L, Begam M, Elamvazuthi I (2010) Voice recognition algorithms using Mel frequency Cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques. arXiv preprint arXiv:1003.4083, 2010

  31. Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In: IEEE/IFIP international conference on dependable systems & networks, pp 125–134

    Google Scholar 

  32. Spacek L (1994) Faces 94: The University of Essex. Face recognition data set. Available: http://cswww.essex.ac.uk/mv/allfaces/faces94.html

  33. Spacek L (1995) Faces 95: The University of Essex. Face recognition data set. Available: http://cswww.essex.ac.uk/mv/allfaces/faces95.html

  34. Spacek L (1996) Faces 96: The university of Essex. Face recognition data set. Available: http://cswww.essex.ac.uk/mv/allfaces/faces96.html

  35. Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) Fvc2000: Fingerprint verification competition. IEEE Trans Pattern Anal Mach Intell 24(3):402–412

    Google Scholar 

  36. Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) FVC 2002: second fingerprint verification competition. In: 16th international conference on pattern recognition, 2002. Proceedings, vol 3. IEEE, pp 811–814

    Google Scholar 

  37. Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2004) Fvc2004: third fingerprint verification competition. In: Biometric authentication. Springer, Berlin, pp 1–7

    Google Scholar 

  38. Dasgupta D, Nag A, Shrein JM, Swindle M (2017) Design and implementation of an adaptive multi-factor authentication (A-MFA) system. Technical report, The University of Memphis, Jan 2017

    Google Scholar 

  39. Simons RH, Bean AR (2008) Lighting engineering: applied calculations. Routledge, USA

    Google Scholar 

  40. Casia-fingerprint v5 (2010) Available: http://biometrics.idealtest.org/

  41. Dasgupta D, Nag AK, Roy A (2015) Adaptive multi-factor authentication system. U.S. Patent Application No. 14/968, 676

    Google Scholar 

Download references

Acknowledgements

Some portion of this work is supported by the National Security Agency under Grant Number: H98230-15-1-0266. Points of view and opinions presented in this chapter are those of the author(s) and do not necessarily represent the position or policies of the National Security Agency or the United States. Authors would like to acknowledge the contribution of other members of the A-MFA research team who helped in running experiments, producing results, and providing feedback.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dipankar Dasgupta .

Questions

Questions

Question 1:

Why is multi-factor a better solution than single-factor-based authentication solution?

Question 2:

What is the authentication factor? What is the novel aspect of the authentication factor discussed in this chapter?

Question 3:

Define the trustworthy value of an authentication factor? How do error rates play a role in calculating the trustworthy factor?

Question 4:

Discuss in details the calculation of trustworthy values of combined authentication factors. Explain the calculation steps using a figure for a specific medium.

Question 5:

What are the two objectives that are addressed for the adaptive selection process? Describe them.

Question 6:

Why is the cardinality of the authentication factor incorporated in the formulation of the first objective for adaptive selection? What is the role of surrounding conditions in the adaptive selection procedure?

Question 7:

Which algorithms used in A-MFA applications are not affected by surrounding conditions and why?

Question 8:

Describe the Processing Plane and Data Plane of the server-side implementation of A-MFA?

Question 9:

Describe the evaluation criteria mentioned for A-MFA? How does adaptive selection perform better than its counterpart selection approaches?

Question 10:

Provide a qualitative analysis of Adaptive-MFA approach with other MFA products.

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Dasgupta, D., Roy, A., Nag, A. (2017). Adaptive Multi-factor Authentication. In: Advances in User Authentication. Infosys Science Foundation Series(). Springer, Cham. https://doi.org/10.1007/978-3-319-58808-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-58808-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-58806-3

  • Online ISBN: 978-3-319-58808-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics