MULTI-FACTOR AUTHENTICATION MODELLING

被引:0
|
作者
Dostalek, L. [1 ]
Safarik, J. [1 ]
机构
[1] Univ West Bohemia Pilsen, Dept Comp Sci & Engn, Plzen, Czech Republic
关键词
authentication; multifactor authentication; risk-based authentication; omnifactor authentication; fraud detection system; password; digital fingerprint;
D O I
10.15588/1607-3274-2020-2-11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Context. Currently, institutions and companies face massive cyber-attacks. Attacks are always focused on some authentication weakness that is part of a particular authentication protocol. In the event of an attack, it is necessary to respond flexibly to the weakening of authentication mechanisms. In the event of an attack, it is necessary to quickly identify the affected authentication factor and its importance to temporarily weaken. Subsequently, it is possible to detect the affected weakness and weaken the meaning of only the algorithms showing this weakness. Algorithms that do not show this weakness should be left unchanged. This paper introduces a mathematics model of authentication. By quick changing the model parameters, we can flexibly adapt the use of authentication means to the situation. Objective. The purpose of this work is to propose a method that will allow to quantify the strength (quality) of authentication. In order it will be possible to dynamically change the authentication method depending on the current risks of attacks. Method. The method is to design a mathematical model and its simulation. The model is then based on the sum of the strengths of the individual authentication factors. A risk-based mechanism is used to determine model parameters. Results. The paper then demonstrates the simulation results using commonly used authentication means. The paper then demonstrates the simulation results using commonly used authentication means: password, hardware based one-time password, device fingerprint, external authentication, and combination of this methods. Simulations have shown that using this mathematical model makes it easy to model the use of authentication resources. Conclusions. With this model, it seems easy to model different security situations. In the real situation, the model parameters will need to be refined as part of the feedback assessment of the established security incidents.
引用
收藏
页码:106 / 116
页数:11
相关论文
共 50 条
  • [41] Runtime adaptive multi-factor authentication for mobile devices
    Castro, P. C.
    Ligman, J. W.
    Pistoia, M.
    Ponzo, J.
    Thomas, G. S.
    Topkara, U.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2013, 57 (06)
  • [42] CLOUD STORAGE SECURITY USING MULTI-FACTOR AUTHENTICATION
    Nikam, Rushikesh
    Potey, Manish
    2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [43] An Extensive Formal Analysis of Multi-factor Authentication Protocols
    Jacomme, Charlie
    Kremer, Steve
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (02)
  • [44] Analysis and improvement of a multi-factor biometric authentication scheme
    Cao, Liling
    Ge, Wancheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 617 - 625
  • [45] Multi-factor authentication scheme based on custom attributes
    Zhu, Dexin
    Zhou, Hu
    Li, Nianfeng
    Song, Lijun
    Zheng, Jun
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7741 - 7756
  • [46] Preventing impersonation attacks in MANET with multi-factor authentication
    Glynos, D
    Kotzanikolaou, P
    Douligeris, C
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS, 2005, : 59 - 64
  • [47] PHY Foundation for Multi-Factor ZigBee Node Authentication
    Ramsey, Benjamin W.
    Temple, Michael A.
    Mullins, Barry E.
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 795 - 800
  • [48] The Emotional Impact of Multi-Factor Authentication for University Students
    Arnold, Davis
    Blackmon, Benjamin
    Gipson, Brendan
    Moncivais, Anthony
    Powell, Garrett
    Skeen, Megan
    Thorson, Michael
    Wade, Nathan
    EXTENDED ABSTRACTS OF THE 2022 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2022, 2022,
  • [49] Lightweight and Secure Multi-Factor Authentication Scheme in VANETs
    Tahir, Haseeb
    Mahmood, Khalid
    Ayub, Muhammad Faizan
    Saleem, Muhammad Asad
    Ferzund, Javed
    Kumar, Neeraj
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) : 14978 - 14986
  • [50] Universal Multi-Factor Authentication Using Graphical Passwords
    Sabzevar, Alireza Pirayesh
    Stavrou, Angelos
    SITIS 2008: 4TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY AND INTERNET BASED SYSTEMS, PROCEEDINGS, 2008, : 625 - 632