Abstract
Nowadays, it is no longer uncommon for a PC to be infected with malware. User authentication based on only one legitimate credential (such as a password) may be insufficient for judging whether a user is legitimate. A typical solution to this problem is two-factor authentication, which is a method of authentication based on the presentation of two factors by the user. Generally, the first factor is input into a PC and the second into a smartphone. However, this reduces usability by forcing the user to present multiple factors at each authentication. Therefore, in this study, a method called multi-observed multi-factor authentication is proposed, whereby multi-factor authentication is performed to confirm that a human has input a legitimate credential by observing the user’s input of a single legitimate credential at multiple points.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The exception is when a One-time password (OTP) is used as the second credential. For example, in [4], the user inputs the OTP sent to the smartphone from the authentication server to the authentication server via the PC, which constitutes two-factor authentication.
References
Kaspersky Emotet modules and recent attacks, SECURELIST, Kaspersky (online), 13 April 2022. https://securelist.com/emotet-modules-and-recent-attacks/106290/. Accessed 28 July 2022
Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., Koucheryavy, Y.: Multi-factor authe ntication: a survey. Cryptography 2(1), 1–31 (2018). https://doi.org/10.3390/cryptography2010001
Microsoft: How it works: azure AD multi-factor authentication, Microsoft (online), 8 Feb 2022. https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks. Accessed 28 July 2022
Amazon: Adding MFA to a user pool, Amazon (online), 18 Nov 2021. https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-mfa.html. Accessed 23 Dec 2021
Bardram, J.E., Kjær, R.E., Pedersen, M.Ø.: Context-Aware User Authentication – Supporting Proximity-Based Login in Pervasive Computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003: Ubiquitous Computing UbiComp 2003. Lecture Notes in Computer Science LNCS, vol. 2864, pp. 107–123. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-39653-6_8
Fathy, M.E., Patel, V.M., Chellappa, R.: Face-based active authentication on mobile devices. In: 2015 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 1687–1691 (2015). https://doi.org/10.1109/ICASSP.2015.7178258
Singh, S., Inamdar, A., Kore, A., Pawar, A.: Analysis of algorithms for user authentication using keystroke dynamics. In: 2020 International Conference on Communication and Signal Processing (ICCSP), pp. 0337–0341 (2020). https://doi.org/10.1109/ICCSP48568.2020.9182115
Tietz, C., Klieme, E., Behrendt, L., Böning, P., Marschke, L., Meinel, C.: Verification of keyboard acoustics authentication on laptops and smartphones using WebRTC. In: 2019 3rd Cybersecurity in Networking Conference (CSNet), pp. 130–137 (2019). https://doi.org/10.1109/CSNet47905.2019.9108962.
Choi, B., Suh, T.: A security program to protect against keyboard-emulating BadUSB. J. Korea Inst. Inf. Secur. Cryptology 26(6), 1483–1492 (2016). https://doi.org/10.13089/JKIISC.2016.26.6.1483
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Nozaki, S. et al. (2022). Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential. In: Barolli, L., Miwa, H., Enokido, T. (eds) Advances in Network-Based Information Systems. NBiS 2022. Lecture Notes in Networks and Systems, vol 526. Springer, Cham. https://doi.org/10.1007/978-3-031-14314-4_20
Download citation
DOI: https://doi.org/10.1007/978-3-031-14314-4_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-14313-7
Online ISBN: 978-3-031-14314-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)