Skip to main content

A Novel Approach for Emergency Backup Authentication Using Fourth Factor

  • Conference paper
  • First Online:
Innovations in Computer Science and Engineering

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 8))

Abstract

In today’s era of improved technology, ease of availability of Internet made every user to access the data at finger tips. Every day transactions are also accomplished online as it is very easy and take less time. Authentication and confidentiality plays a vital role in transmitting the data through the medium of Internet. Authentication is usually implemented through any or all of the authentication factors such as username, password, smart cards, biometrics etc. If the user is unable to provide any of the authentication factors to the system at that instance of time, the user becomes unauthenticated and cannot make any transaction even though, a legitimate user. In this paper we are proposing a new factor for authentication called the fourth factor. This is based on social relations where the legitimate but unauthenticated user can take the help of any trusted third party like a friend, spouse, blood relation who will support in the authentication process in case of failure of credentials. The user can be authenticated with the trusted party and can make a single emergency transaction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. John Brainard., Ari juels., RonaldRivest L., Michael Szydlo., Moti Yung.: Fourth Factor Authentication: Somebody You Know. ACM, (2010)

    Google Scholar 

  2. Schechter S., Egelman S., Reeder R.W.: It’s not what you know, but who you know: A Social Approach to Last-Resort Authentication. ACM SIGCHI, Conference on Human Factors in Computing Systems, (2009)

    Google Scholar 

  3. McCune J.M., PerrigA., Reiter M.K., Seeing-is-believing: Using camera phones for human-verifiable authentication. in. IEEE Symposium on Security and Privacy, pp. 110–124, (2005)

    Google Scholar 

  4. Xinyi Huang., Yang Ashley Chonka., Jianying Zhou., Robert H. Deng.: A Generic Framework for Three-Factor Authentication Preserving Security and Privacy in Distributed Systems, in. IEEE Xplore, (2011)

    Google Scholar 

  5. Wen-Bin Hsieh., Jenq-ShiouLeu., “Design of a time and location based One-Time Password authentication scheme”, 7th International Wireless Communications and Mobile Computing Conference, 978-1-4244-9539-9, (2011)

    Google Scholar 

  6. EkoSediyono., Kartika Imam., Santoso., Suhartono., “Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS”, 978-1-4799-2432-5, Aug. (2013)

    Google Scholar 

  7. Jiri Sobotka., RadekDolze.: Multifactor Authentication Systems, pp. 1–7, (2010)

    Google Scholar 

  8. Clancy C. T., Kiyavash N., Lin D. J.,: Secure Smartcard-Based Fingerprint Authentication, in. Workshop on Biometric Methods and Applications, (2003)

    Google Scholar 

  9. Stephen S. Hamilton., Martin C. Carlisle,. John A. Hamilton.: A Global Look at Authentication, in. IEEE SMC Information Assurance Workshop, West Point NY, (2007)

    Google Scholar 

  10. Bhargav-Spantzel A., Squicciarini A., ElisaB.: Privacy Preserving Multi-Factor Authentication with Biometrics, pp 63–71, DIM Alexandria Virginia, (2006)

    Google Scholar 

  11. GarfinkelS. L., Email-Based Identification and Authentication: An Alternative to PKI, IEEE Computer Society, pp. 20–26, (2003)

    Google Scholar 

  12. Jain A., Hong. L., Pankanti. S.: Biometric Identification. In. Communications of the ACM, pp 91–98, (2010)

    Google Scholar 

  13. M. C. Chuang and M. C. Chen, “An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics,” Expert Systems with Applications, 41(1):1411–1418, (2014)

    Google Scholar 

  14. Chun-Ta Li., Cheng-Chi Lee., Hua-Hsuan Chen., Min-JieSyu., Chun-Cheng Wang., “Cryptanalysis of An Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics”, 978–1-4799-8342-1/15, IEEE 498 ICOIN (2015)

    Google Scholar 

  15. FadiAloul., Syed Zahidi., Wassim El-Haj.:Two Factor Authentication Using Mobile Phones, in. IEEE International Conferenceon Computer Systems and Applications, AICCSA, pp. 641–644. (2009)

    Google Scholar 

  16. BijanSoleymani., MuthucumaruMaheswaran.: Social Authentication Protocol for Mobile Phones in International Conference on Computational Science and Engineering, (2009)

    Google Scholar 

  17. RSASecureID Authenticators: http://www.rsa.com

  18. Yardi S., Feamster., Bruckman A.,: Photo-based authentication using social networks In WOSN, (2008)

    Google Scholar 

  19. RituPahal., Vikaskumar.,: Efficient Implementation of AES.,: International Journal of Advanced Research in Computer Science and Software Engineering, 3,7, (2013)

    Google Scholar 

  20. Xiao-Min Wang., Wen-Fang Zhang., Jia-Shu Zhang., Muhammad Khurram Khan.: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards, (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Sharmila .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Sharmila, K., Janaki, V., Nagaraju, A. (2017). A Novel Approach for Emergency Backup Authentication Using Fourth Factor. In: Saini, H., Sayal, R., Rawat, S. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 8. Springer, Singapore. https://doi.org/10.1007/978-981-10-3818-1_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3818-1_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3817-4

  • Online ISBN: 978-981-10-3818-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics