Title
An Adaptive Approach Towards the Selection of Multi-Factor Authentication
Abstract
Authentication is the fundamental defense against any illegitimate access to a computing device or any sensitive online applications. Due to recent trends of emerging security threats, authentication using only a single factor is not reliable to provide adequate protection for these devices and applications. Hence, to facilitate continuous protection of computing devices and other critical online services from an un-authorized access, multi-factor authentication emerges as a viable option. Many authentication mechanisms with varying degrees of accuracy and portability are available for different types of computing devices connected with various communicating media. As a consequence, several existing and well-known multi-factor authentication strategies have already been utilized to enhance the security of various applications. Keeping this in mind, this research is focused on designing a robust and scalable framework for authenticating a legitimate user efficiently through a subset of available authentication modalities along with their several features (authentication factors) in time-varying operating environments (devices, media and surrounding conditions) on a regular basis. This paper highlights the creation of a trustworthy framework to quantify different authentication factors in terms of selection of different types of devices and media. In addition, a novel adaptive selection strategy for the available authentication factors incorporating the trustworthy values, previous history of selection as well as surrounding conditions is proposed in the paper. Selection through adaptive strategy ensures the incorporation of the existing environmental conditions within the selection of authentication factors and provides better diversity in the selection of these factors. Simulation results show that the proposed selection approach performs better than other existing selection strategies, namely, random and optimal selections in different settings of operating environments.
Year
DOI
Venue
2015
10.1109/SSCI.2015.75
2015 IEEE Symposium Series on Computational Intelligence
Keywords
Field
DocType
adaptive approach,multifactor authentication selection,defense,illegitimate access,computing device,online applications,security threats,critical online services,communicating media,legitimate user authentication,authentication modalities,authentication factors,time-varying operating environments,adaptive selection strategy,trustworthy values,environmental conditions
Lightweight Extensible Authentication Protocol,Computer access control,NTLMSSP,Authentication,Challenge-Handshake Authentication Protocol,Challenge–response authentication,Computer security,Computer science,Authentication protocol,Multi-factor authentication,Distributed computing
Conference
ISBN
Citations 
PageRank 
978-1-4799-7560-0
5
0.43
References 
Authors
18
3
Name
Order
Citations
PageRank
Abhijit Kumar Nag1212.07
Arunava Roy2454.82
D. Dasgupta3634.42