Multi-Factor Authentication: A Survey
Top Cited Papers
Open Access
- 4 January 2018
- journal article
- research article
- Published by MDPI AG in Cryptography
- Vol. 2 (1), 1
- https://doi.org/10.3390/cryptography2010001
Abstract
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA) starting from Single-Factor Authentication (SFA) and through Two-Factor Authentication (2FA). Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers) that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS) scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.Keywords
This publication has 115 references indexed in Scilit:
- A Review of Data Fusion TechniquesThe Scientific World Journal, 2013
- Security evaluation of biometric authentication systems under real spoofing attacksIET Biometrics, 2012
- A survey on biometric cryptosystems and cancelable biometricsEURASIP Journal on Information Security, 2011
- Efficient and robust segmentation of noisy iris images for non-cooperative iris recognitionImage and Vision Computing, 2010
- BiosecurID: a multimodal biometric databasePattern Analysis and Applications, 2009
- An efficient threshold verifiable multi-secret sharingComputer Standards & Interfaces, 2008
- Biosec baseline corpus: A multimodal biometric databasePattern Recognition, 2007
- Biohashing: two factor authentication featuring fingerprint data and tokenised random numberPattern Recognition, 2004
- Combining flat and structured representations for fingerprint classification with recursive neural networks and support vector machinesPattern Recognition, 2003
- Face recognition by independent component analysisIEEE Transactions on Neural Networks, 2002