Authentication Credentials

Authentication Credentials

Citations

... Multi-Factor Authentication (MFA) is a technique [1] [2] that enables the computing of cryptographic procedures involved in authentication processes, thanks to authentication credentials bound to human user, according to several factors. For example, something user has, something user known, something user does. ...
... As 2FA necessitates two authentication factors from users to augment the security beyond a mere password, the adoption of the second factor has become a research question and investigated in [5]- [7]. Researchers have used a range of factors encompassing knowledge-based, possession-based, inherencebased, location-based, behavioral-based, and ambient-based factors [8]. Each approach aims to uniquely verify a user's identity while bolstering information security. ...
Article
Full-text available
The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated frequently. To tackle this challenge, we present a novel 2FA approach replacing the user's input with decisions made by Machine Learning (ML) that continuously verifies the user's identity with zero effort. Our system exploits unique environmental features associated with the user, such as beacon frame characteristics and Received Signal Strength Indicator (RSSI) values from Wi-Fi Access Points (APs). These features are gathered and analyzed in real-time by our ML algorithm to ascertain the user's identity. For enhanced security, our system mandates that the user's two devices (i.e., a login device and a mobile device) be situated within a predetermined proximity before granting access. This precaution ensures that unauthorized users cannot access sensitive information or systems, even with the correct login credentials. Through experimentation, we have demonstrated our system's effectiveness in determining the location of the user's devices based on beacon frame characteristics and RSSI values, achieving an accuracy of 92.4%. Additionally, we conducted comprehensive security analysis experiments to evaluate the proposed 2FA system's resilience against various cyberattacks. Our findings indicate that the system exhibits robustness and reliability in the face of these threats. The scalability, flexibility, and adaptability of our system render it a promising option for organizations and users seeking a secure and convenient authentication system.
... Two-factor authentication offers user convenience, as it involves a straightforward process of downloading a single application that requires only one installation on the computer. Contrary to the misconception that implementing two-factor authentication is expensive and unnecessary, many small businesses and institutions underestimate the prevalence of cyberattacks targeting them [22]. In reality, more than 30% of cyberattacks occur against small institutions. ...
Article
Full-text available
Moodle is a platform designed for universal learning to support pedagogical interactions and educational activities. The information technology (IT) administrator uses standard authentication methods for students logging into the Moodle platform. The need for two-factor authentication has grown as institutions, governments, and individuals realize that passwords are not secure enough to protect user accounts in their current technical format. The classic connection methods have vulnerabilities, and account passwords are easy to crack. Analyzing these aspects, the goal is to create a new safe and reliable alternative to the traditional authentication methods in e-learning platforms. The proposed solution introduces a new authentication factor using digital certificates stored on physical devices or the cloud to address the evolving authentication and security challenges effectively. The absence of this authentication within the Moodle ecosystem has imparted a sense of urgency for its implementation. With the innovative authentication scheme, the users have gained confidence, are satisfied with the new solution, and have not reported security breaches. The result is increased security, data protection, and better account management.
... Few researches propose using GPS for location verification. However, using GPS suffers from performance limitations indoors [7]. Other systems use wireless sensor network for localization [8]. ...
... On the other hand, Bluetooth had T uplen = {SSIDn, BSSIDn, RSSIn} (1) been a popular choice for proximity-based authentication [9], [10]. In addition, the weakness in these approaches is that Bluetooth typically has a short-range and requires additional hardware that is not always guaranteed to be in the infrastructure or in every user's device [7]. Wi-Fi is a popular solution for proximity-based authentication ...
Preprint
Full-text available
Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g. vehicles home appliances sensors actuators etc.) known as Things to connect and exchange data more importantly without human interaction. Since IoT plays a significant role in our daily lives we must secure the IoT environment to work effectively. Among the various security requirements authentication to the IoT devices is essential as it is the first step in preventing any negative impact of possible attackers. Using the current IEEE 802.11 infrastructure this paper implements an IoT devices authentication scheme based on something that is in the IoT devices environment (i.e. ambient access points). Data from the broadcast messages (i.e. beacon frame characteristics) are utilized to implement the authentication factor that confirms proximity between two devices in an ad hoc IoT network.
... Few researches propose using GPS for location verification. However, using GPS suffers from performance limitations indoors [7]. Other systems use wireless sensor network for localization [8]. ...
... On the other hand, Bluetooth had been a popular choice for proximity-based authentication [9], [10]. In addition, the weakness in these approaches is that Bluetooth typically has a short-range and requires additional hardware that is not always guaranteed to be in the infrastructure or in every user's device [7]. Wi-Fi is a popular solution for proximity-based authentication are ubiquitous and widely used for connectivity in many users [11]- [13] and IoT devices. ...
Technical Report
Full-text available
Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g., vehicles, home appliances sensors, actuators, etc.), known as Things, to connect and exchange data, more importantly, without human interaction. Since IoT plays a significant role in our daily lives, we must secure the IoT environment to work effectively. Among the various security requirements, authentication to the IoT devices is essential as it is the first step in preventing any negative impact of possible attackers. Using the current IEEE 802.11 infrastructure, this paper implements an IoT devices authentication scheme based on something that is in the IoT device's environment (i.e., ambient access points). Data from the broadcast messages (i.e., beacon frame characteristics) are utilized to implement the authentication factor that confirms proximity between two devices in an ad hoc IoT network.
... Once a network administrator understands how different authentication schemes function, they will be able to establish an appropriate user authentication strategy for their network using one or more techniques. Therefore, there is a need to provide different authentication methods that preserve the user's privacy and secure his information in a usable manner [6]. ...
Article
Full-text available
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud security from unauthorized access and data breaches. Multi-factor authentication verifies that authentic cloud users are only authorized to access cloud apps, data, services, and resources, making it more secure for enterprises and less inconvenient for users. The number of authentication factors varies based on the security framework’s architecture and the required security level. Therefore, implementing a secured multi-factor authentication framework in a cloud platform is a challenging process. In this paper, we developed an adaptive multi-factor multi-layer authentication framework that embeds an access control and intrusion detection mechanisms with an automated selection of authentication methods. The core objective is to enhance a secured cloud platform with low false positive alarms that makes it more difficult for intruders to access the cloud system. To enhance the authentication mechanism and reduce false alarms, multiple authentication factors that include the length, validity, and value of the user factor is implemented with a user’s geolocation and user’s browser confirmation method that increase the identity verification of cloud users. An additional AES-based encryption component is applied to data, which are protected from being disclosed. The AES encryption mechanism is implemented to conceal the login information on the directory provider of the cloud. The proposed framework demonstrated excellent performance in identifying potentially malicious users and intruders, thereby effectively preventing any intentional attacks on the cloud services and data.
Article
Full-text available
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest numerous approaches to enhance cloud authentication towards robustness. User names and associated passwords have been a common practice for long as Single Factor Authentication. However, advancements in the speed of computing and the usage of simple methods, starting from the Brute Force technique to the implementation of advanced and efficient crytographic algorithms, have posed several threats and vulnerabilities for authentication systems, leading to the degradation of their effectiveness. Multi-factor authentication has emerged as a robust means of securing the cloud using simultaneous and multiple means of authentication factors. This employs multiple levels of cascaded authentication checks. This paper covers an extensive and systematic survey of various factors towards their adoption and suitability for authentication for multi-factor authentication mechanisms. The inference drawn from the survey is in terms of arriving at a unique authentication factor that does not require any additional, specialized hardware or software for multi-factor authentication. Such authentication also uses the distinct biometric characteristics of the concerned user in the process. This arrangement augments the secured and robust user authentication process. The mechanism is also assessed as an effective means against impersonation attacks.