A multifactor authentication system using secret splitting in the perspective of Cloud of Things

Author(s):  
Rohan H. Shah ◽  
D. P. Salapurkar
Biometrics ◽  
2017 ◽  
pp. 1834-1852
Author(s):  
Jagannath Mohan ◽  
Adalarasu Kanagasabai ◽  
Vetrivelan Pandu

In the recent decade, one of our major concerns in the global technological society of information security is confirmation that a person accessing confidential information is authorized to perform so. Such mode of access is generally accomplished by a person's confirming their identity by the use of some method of authentication system. In present days, the requirement for safe security in storing individual information has been developing rapidly and among the potential alternative is implementing innovative biometric identification techniques. This chapter discusses how the advent of the 20th century has brought forth the security principles of identification and authentication in the field of biometric analysis. The chapter reviews vulnerabilities in biometric authentication and issues in system implementation. The chapter also proposes the multifactor authentication and the use of multimodal biometrics, i.e., the combination of Electrocardiogram (ECG) and Phonocardiogram (PCG) signals to enhance reliability in the authentication process.


2019 ◽  
Vol 2 (6) ◽  
Author(s):  
Abbas Acar ◽  
Wenyi Liu ◽  
Raheem Beyah ◽  
Kemal Akkaya ◽  
Arif Selcuk Uluagac

Cryptography ◽  
2020 ◽  
Vol 4 (2) ◽  
pp. 12
Author(s):  
Robert Cockell ◽  
Basel Halak

This paper proposes a portable hardware token for user’s authentication; it is based on the use of keystroke dynamics to verify users biometrically. The proposed approach allows for a multifactor authentication scheme, in which a user cannot be granted access unless they provide a correct password on a hardware token and their biometric signature. The latter is extracted while the user is typing their password. This paper explains the design rationale of the proposed system and provides a comprehensive insight in the development of a hardware prototype of the same. The paper also presents a feasibility study that included a systematic analysis based on training data obtained from 32 users. Our results show that dynamic keystroke can be employed to construct a cost-efficient solution for biometric user authentication with an average error rate of 4.5%.


Author(s):  
Jagannath Mohan ◽  
Adalarasu Kanagasabai ◽  
Vetrivelan Pandu

In the recent decade, one of our major concerns in the global technological society of information security is confirmation that a person accessing confidential information is authorized to perform so. Such mode of access is generally accomplished by a person's confirming their identity by the use of some method of authentication system. In present days, the requirement for safe security in storing individual information has been developing rapidly and among the potential alternative is implementing innovative biometric identification techniques. This chapter discusses how the advent of the 20th century has brought forth the security principles of identification and authentication in the field of biometric analysis. The chapter reviews vulnerabilities in biometric authentication and issues in system implementation. The chapter also proposes the multifactor authentication and the use of multimodal biometrics, i.e., the combination of Electrocardiogram (ECG) and Phonocardiogram (PCG) signals to enhance reliability in the authentication process.


2019 ◽  
Vol 2 (5) ◽  
Author(s):  
Abbas Acar ◽  
Wenyi Liu ◽  
Raheem Beyah ◽  
Kemal Akkaya ◽  
Arif Selcuk Uluagac

Sign in / Sign up

Export Citation Format

Share Document