MULTI-FACTOR AUTHENTICATION MODELLING

被引:0
|
作者
Dostalek, L. [1 ]
Safarik, J. [1 ]
机构
[1] Univ West Bohemia Pilsen, Dept Comp Sci & Engn, Plzen, Czech Republic
关键词
authentication; multifactor authentication; risk-based authentication; omnifactor authentication; fraud detection system; password; digital fingerprint;
D O I
10.15588/1607-3274-2020-2-11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Context. Currently, institutions and companies face massive cyber-attacks. Attacks are always focused on some authentication weakness that is part of a particular authentication protocol. In the event of an attack, it is necessary to respond flexibly to the weakening of authentication mechanisms. In the event of an attack, it is necessary to quickly identify the affected authentication factor and its importance to temporarily weaken. Subsequently, it is possible to detect the affected weakness and weaken the meaning of only the algorithms showing this weakness. Algorithms that do not show this weakness should be left unchanged. This paper introduces a mathematics model of authentication. By quick changing the model parameters, we can flexibly adapt the use of authentication means to the situation. Objective. The purpose of this work is to propose a method that will allow to quantify the strength (quality) of authentication. In order it will be possible to dynamically change the authentication method depending on the current risks of attacks. Method. The method is to design a mathematical model and its simulation. The model is then based on the sum of the strengths of the individual authentication factors. A risk-based mechanism is used to determine model parameters. Results. The paper then demonstrates the simulation results using commonly used authentication means. The paper then demonstrates the simulation results using commonly used authentication means: password, hardware based one-time password, device fingerprint, external authentication, and combination of this methods. Simulations have shown that using this mathematical model makes it easy to model the use of authentication resources. Conclusions. With this model, it seems easy to model different security situations. In the real situation, the model parameters will need to be refined as part of the feedback assessment of the established security incidents.
引用
收藏
页码:106 / 116
页数:11
相关论文
共 50 条
  • [31] A lightweight multi-factor mobile user authentication scheme
    Sun, Jianguo
    Zhong, Qi
    Kou, Liang
    Wang, Wenshan
    Da, Qingan
    Lin, Yun
    IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 831 - 836
  • [32] On the Security of Multi-Factor Authentication: Several Instructive Examples
    Huang, Yun
    Xue, Weijia
    Huang, Geshi
    Lai, Xuejia
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 685 - 687
  • [33] A review of multi-factor authentication in the Internet of Healthcare Things
    Suleski, Tance
    Ahmed, Mohiuddin
    Yang, Wencheng
    Wang, Eugene
    DIGITAL HEALTH, 2023, 9
  • [34] An Adaptive Approach Towards the Selection of Multi-factor Authentication
    Nag, Abhijit Kumar
    Roy, Arunava
    Dasgupta, Dipankar
    2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2015, : 463 - 472
  • [35] A Modular Framework for Multi-Factor Authentication and Key Exchange
    Fleischhacker, Nils
    Manulis, Mark
    Azodi, Amir
    SECURITY STANDARDISATION RESEARCH, SSR 2014, 2014, 8893 : 190 - 214
  • [36] Multi-factor EEG-based User Authentication
    Tien Pham
    Ma, Wanli
    Dat Tran
    Phuoc Nguyen
    Dinh Phung
    PROCEEDINGS OF THE 2014 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2014, : 4029 - 4034
  • [37] Biometric multi-factor authentication: On the usability of the FingerPIN scheme
    Marasco, Emanuela
    Albanese, Massimiliano
    Patibandla, Venkata Vamsi Ram
    Vurity, Anudeep
    Sriram, Sumanth Sai
    SECURITY AND PRIVACY, 2023, 6 (01)
  • [38] Framework for Multi-factor Authentication with Dynamically Generated Passwords
    Chenchev, Ivaylo
    ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 563 - 576
  • [39] Secure biometric template generation for multi-factor authentication
    Khan, Salman H.
    Akbar, M. Ali
    Shahzad, Farrukh
    Farooq, Mudassar
    Khan, Zeashan
    PATTERN RECOGNITION, 2015, 48 (02) : 458 - 472
  • [40] Signing Documents by Hand: Model for Multi-Factor Authentication
    Bezzateev, Sergey
    Voloshina, Natalia
    Davydov, Vadim
    Minaeva, Tamara
    Rudavin, Nikolay
    INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2018, 2018, 11118 : 299 - 311