Back to Search Start Over

Necessity of Fourth Factor Authentication with Multiple Variations as Enhanced User Authentication Technique

Authors :
Vinjamuri Janaki
K. Sharmila
Source :
Proceedings of the Third International Conference on Computational Intelligence and Informatics ISBN: 9789811514791
Publication Year :
2020
Publisher :
Springer Singapore, 2020.

Abstract

Authentication plays a vital role in granting access to a user by any computing system. There are several existing authentication techniques used for different scenarios which include one-factor, two-factor, and three-factor authentication, where the user submits required credentials and gains access to the system. When a legitimate user is unable to provide his credentials at any point of time, the user becomes unauthenticated. At this juncture, we have proposed a fourth factor for authentication where a legitimate user can seek assistance from any of his close associates like a spouse, friend, and colleague and can gain access to the system for a single time. In this paper, we consider multiple variations of fourth-factor authentication and compare them within the framework and explore the mechanism by applying various metrics such as key size, the ease of use, time and space complexity of the algorithms, and security considerations.

Details

Database :
OpenAIRE
Journal :
Proceedings of the Third International Conference on Computational Intelligence and Informatics ISBN: 9789811514791
Accession number :
edsair.doi...........5d44698e5e148768336f42a95dfcd5f1
Full Text :
https://doi.org/10.1007/978-981-15-1480-7_41