Abstract
With the advancements of modern technology, most user activities rely upon various online services, which need to be trusted and secured to prevent the thorny issue of illegal access. Authentication is the primary defense to address the growing need of authentications, though a single-factor (user id and password, for example) is suffering from some significant pitfalls as mentioned in earlier chapters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rouse M (2015) Multifactor authentication (MFA). Available: http://searchsecurity.techtarget.com/definition/multifactorauthentication-MFA, Mar 2015
Strom D (2014) Multifactor authentication examples and business case scenarios. Available: http://searchsecurity.techtarget.com/feature/The-fundamentals-of-MFA-The-business-case-for-multifactor-authentication, Oct 2014
Niinuma K, Jain AK (2010) Continuous user authentication using temporal information. In: SPIE defense, security, and sensing. International Society for Optics and Photonics, pp 76 670L–76 670L
Fathy ME, Patel VM, Yeh T, Zhang Y, Chellappa R, Davis LS (2014) Screen-based active user authentication. Pattern Recogn Lett 42:122–127
Primo A, Phoha VV, Kumar R, Serwadda A (2014) Context-aware active authentication using smartphone accelerometer measurements. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 98–105
Vielhauer C (2005) Biometric user authentication for IT security: from fundamentals to handwriting, vol 18. Springer Science & Business Media, Berlin
Nag AK, Dasgupta D, Deb K (2014) An adaptive approach for active multi-factor authentication. In: 9th annual symposium on information assurance (ASIA14), p 39
Nag AK, Dasgupta D (2014) An adaptive approach for continuous multi-factor authentication in an identity eco-system. In: ACM proceedings of the 9th annual cyber and information security research conference, pp 65–68
Nag AK, Roy A, Dasgupta D (2015) An adaptive approach towards the selection of multi-factor authentication. In: IEEE symposium series on computational intelligence, pp 463–472
Dasgupta D, Nag AK, Roy A (2016) Adaptive multi-factor authentication system. U.S. Patent Application No. 14/968, 676, Dec 2016
Duc NM, Minh BQ (2009) Your face is not your password face authentication bypassing lenovo–asus–toshiba. Black Hat Briefings
Hwang S, Lee H, Cho S (2006) Improving authentication accuracy of unfamiliar passwords with pauses and cues for keystroke dynamics-based authentication. In: Intelligence and security informatics. Springer, Berlin, pp 73–78
Hoog A (2016) SMS two-factor authentication security NIST statement on sms-based two-factor authentication: Whats it mean for CISOs? NowSecure, July 2016. Available: https://www.nowsecure.com/blog/2016/07/31/nist-statementon-sms-based-two-factor-authentication-what-s-it-mean-for-cisos/
Balaban D (2013) Understanding CAPTCHA-solving services in an economic context 3: evaluation of the human-based services, Mar 2013
Nag AK, Roy A, Dasgupta D (2015) An adaptive approach towards the selection of multi-factor authentication. IEEE symposium series on computational intelligence (SSCI), pp 463–472
Dasgupta D, Roy A, Nag Abhijit (2016) Toward the design of adaptive selection strategies for multi-factor authentication. Comput Secur 63:85–116
Griva I, Nash SG, Sofer A (2009) Linear and nonlinear optimization. SIAM
Arduino mega 2560 (2016) Available: https://www.arduino.cc/en/Main/arduinoBoardMega2560
Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: IEEE proceedings computer society conference on computer vision and pattern recognition (CVPR), pp 586–591
Jiang XY, Wong HS, Zhang D (2006) Face recognition based on 2D Fisherface approach. Pattern Recogn 39(4):707–710
Belhumeur PN, Hespanha JP, Kriegman DJ (1997) Eigenfaces versus Fisherfaces: recognition using class specific linear projection. IEEE Trans Pattern Anal Mach Intell 19(7):711–720
Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037–2041
Ratha NK, Chen S, Jain AK (1995) Adaptive flow orientation-based feature extraction in fingerprint images. Pattern Recogn 28(11):1657–1672
Vazan R (2009) Source AFIS—fingerprint recognition library for .net and experimentally for java
Jiang X, Yau WY (2000) Fingerprint minutiae matching based on the local and global structures. In: 15th international conference on pattern recognition. Proceedings, vol 2, pp 1038–1041
Medina-P´erez MA, Garcίa-Borroto M, Gutierrez-Rodr´ıguez AE, Altamirano-Robles L (2012) Improving fingerprint verification using minutiae triplets. Sensors 12(3):3418–3437
Davis S, Mermelstein P (1980) Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences. IEEE Trans Acoust Speech Signal Process 28(4):357–366
Hermansky H (1990) Perceptual linear predictive (PLP) analysis of speech. J Acoust Soc Am 87(4):1738–1752
Adami AG, Mihaescu R, Reynolds DA, Godfrey JJ (2003) Modeling prosodic dynamics for speaker recognition. In: Proceedings of IEEE international conference on acoustics, speech, and signal processing, vol 4, pp IV–788
Muda L, Begam M, Elamvazuthi I (2010) Voice recognition algorithms using Mel frequency Cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques. arXiv preprint arXiv:1003.4083, 2010
Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In: IEEE/IFIP international conference on dependable systems & networks, pp 125–134
Spacek L (1994) Faces 94: The University of Essex. Face recognition data set. Available: http://cswww.essex.ac.uk/mv/allfaces/faces94.html
Spacek L (1995) Faces 95: The University of Essex. Face recognition data set. Available: http://cswww.essex.ac.uk/mv/allfaces/faces95.html
Spacek L (1996) Faces 96: The university of Essex. Face recognition data set. Available: http://cswww.essex.ac.uk/mv/allfaces/faces96.html
Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) Fvc2000: Fingerprint verification competition. IEEE Trans Pattern Anal Mach Intell 24(3):402–412
Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) FVC 2002: second fingerprint verification competition. In: 16th international conference on pattern recognition, 2002. Proceedings, vol 3. IEEE, pp 811–814
Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2004) Fvc2004: third fingerprint verification competition. In: Biometric authentication. Springer, Berlin, pp 1–7
Dasgupta D, Nag A, Shrein JM, Swindle M (2017) Design and implementation of an adaptive multi-factor authentication (A-MFA) system. Technical report, The University of Memphis, Jan 2017
Simons RH, Bean AR (2008) Lighting engineering: applied calculations. Routledge, USA
Casia-fingerprint v5 (2010) Available: http://biometrics.idealtest.org/
Dasgupta D, Nag AK, Roy A (2015) Adaptive multi-factor authentication system. U.S. Patent Application No. 14/968, 676
Acknowledgements
Some portion of this work is supported by the National Security Agency under Grant Number: H98230-15-1-0266. Points of view and opinions presented in this chapter are those of the author(s) and do not necessarily represent the position or policies of the National Security Agency or the United States. Authors would like to acknowledge the contribution of other members of the A-MFA research team who helped in running experiments, producing results, and providing feedback.
Author information
Authors and Affiliations
Corresponding author
Questions
Questions
Question 1:
Why is multi-factor a better solution than single-factor-based authentication solution?
Question 2:
What is the authentication factor? What is the novel aspect of the authentication factor discussed in this chapter?
Question 3:
Define the trustworthy value of an authentication factor? How do error rates play a role in calculating the trustworthy factor?
Question 4:
Discuss in details the calculation of trustworthy values of combined authentication factors. Explain the calculation steps using a figure for a specific medium.
Question 5:
What are the two objectives that are addressed for the adaptive selection process? Describe them.
Question 6:
Why is the cardinality of the authentication factor incorporated in the formulation of the first objective for adaptive selection? What is the role of surrounding conditions in the adaptive selection procedure?
Question 7:
Which algorithms used in A-MFA applications are not affected by surrounding conditions and why?
Question 8:
Describe the Processing Plane and Data Plane of the server-side implementation of A-MFA?
Question 9:
Describe the evaluation criteria mentioned for A-MFA? How does adaptive selection perform better than its counterpart selection approaches?
Question 10:
Provide a qualitative analysis of Adaptive-MFA approach with other MFA products.
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Dasgupta, D., Roy, A., Nag, A. (2017). Adaptive Multi-factor Authentication. In: Advances in User Authentication. Infosys Science Foundation Series(). Springer, Cham. https://doi.org/10.1007/978-3-319-58808-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-58808-7_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-58806-3
Online ISBN: 978-3-319-58808-7
eBook Packages: Computer ScienceComputer Science (R0)