Abstract
In today’s era of improved technology, ease of availability of Internet made every user to access the data at finger tips. Every day transactions are also accomplished online as it is very easy and take less time. Authentication and confidentiality plays a vital role in transmitting the data through the medium of Internet. Authentication is usually implemented through any or all of the authentication factors such as username, password, smart cards, biometrics etc. If the user is unable to provide any of the authentication factors to the system at that instance of time, the user becomes unauthenticated and cannot make any transaction even though, a legitimate user. In this paper we are proposing a new factor for authentication called the fourth factor. This is based on social relations where the legitimate but unauthenticated user can take the help of any trusted third party like a friend, spouse, blood relation who will support in the authentication process in case of failure of credentials. The user can be authenticated with the trusted party and can make a single emergency transaction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
John Brainard., Ari juels., RonaldRivest L., Michael Szydlo., Moti Yung.: Fourth Factor Authentication: Somebody You Know. ACM, (2010)
Schechter S., Egelman S., Reeder R.W.: It’s not what you know, but who you know: A Social Approach to Last-Resort Authentication. ACM SIGCHI, Conference on Human Factors in Computing Systems, (2009)
McCune J.M., PerrigA., Reiter M.K., Seeing-is-believing: Using camera phones for human-verifiable authentication. in. IEEE Symposium on Security and Privacy, pp. 110–124, (2005)
Xinyi Huang., Yang Ashley Chonka., Jianying Zhou., Robert H. Deng.: A Generic Framework for Three-Factor Authentication Preserving Security and Privacy in Distributed Systems, in. IEEE Xplore, (2011)
Wen-Bin Hsieh., Jenq-ShiouLeu., “Design of a time and location based One-Time Password authentication scheme”, 7th International Wireless Communications and Mobile Computing Conference, 978-1-4244-9539-9, (2011)
EkoSediyono., Kartika Imam., Santoso., Suhartono., “Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS”, 978-1-4799-2432-5, Aug. (2013)
Jiri Sobotka., RadekDolze.: Multifactor Authentication Systems, pp. 1–7, (2010)
Clancy C. T., Kiyavash N., Lin D. J.,: Secure Smartcard-Based Fingerprint Authentication, in. Workshop on Biometric Methods and Applications, (2003)
Stephen S. Hamilton., Martin C. Carlisle,. John A. Hamilton.: A Global Look at Authentication, in. IEEE SMC Information Assurance Workshop, West Point NY, (2007)
Bhargav-Spantzel A., Squicciarini A., ElisaB.: Privacy Preserving Multi-Factor Authentication with Biometrics, pp 63–71, DIM Alexandria Virginia, (2006)
GarfinkelS. L., Email-Based Identification and Authentication: An Alternative to PKI, IEEE Computer Society, pp. 20–26, (2003)
Jain A., Hong. L., Pankanti. S.: Biometric Identification. In. Communications of the ACM, pp 91–98, (2010)
M. C. Chuang and M. C. Chen, “An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics,” Expert Systems with Applications, 41(1):1411–1418, (2014)
Chun-Ta Li., Cheng-Chi Lee., Hua-Hsuan Chen., Min-JieSyu., Chun-Cheng Wang., “Cryptanalysis of An Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics”, 978–1-4799-8342-1/15, IEEE 498 ICOIN (2015)
FadiAloul., Syed Zahidi., Wassim El-Haj.:Two Factor Authentication Using Mobile Phones, in. IEEE International Conferenceon Computer Systems and Applications, AICCSA, pp. 641–644. (2009)
BijanSoleymani., MuthucumaruMaheswaran.: Social Authentication Protocol for Mobile Phones in International Conference on Computational Science and Engineering, (2009)
RSASecureID Authenticators: http://www.rsa.com
Yardi S., Feamster., Bruckman A.,: Photo-based authentication using social networks In WOSN, (2008)
RituPahal., Vikaskumar.,: Efficient Implementation of AES.,: International Journal of Advanced Research in Computer Science and Software Engineering, 3,7, (2013)
Xiao-Min Wang., Wen-Fang Zhang., Jia-Shu Zhang., Muhammad Khurram Khan.: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards, (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharmila, K., Janaki, V., Nagaraju, A. (2017). A Novel Approach for Emergency Backup Authentication Using Fourth Factor. In: Saini, H., Sayal, R., Rawat, S. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 8. Springer, Singapore. https://doi.org/10.1007/978-981-10-3818-1_34
Download citation
DOI: https://doi.org/10.1007/978-981-10-3818-1_34
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3817-4
Online ISBN: 978-981-10-3818-1
eBook Packages: EngineeringEngineering (R0)