Skip to main content

Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential

  • Conference paper
  • First Online:
Advances in Network-Based Information Systems (NBiS 2022)

Abstract

Nowadays, it is no longer uncommon for a PC to be infected with malware. User authentication based on only one legitimate credential (such as a password) may be insufficient for judging whether a user is legitimate. A typical solution to this problem is two-factor authentication, which is a method of authentication based on the presentation of two factors by the user. Generally, the first factor is input into a PC and the second into a smartphone. However, this reduces usability by forcing the user to present multiple factors at each authentication. Therefore, in this study, a method called multi-observed multi-factor authentication is proposed, whereby multi-factor authentication is performed to confirm that a human has input a legitimate credential by observing the user’s input of a single legitimate credential at multiple points.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The exception is when a One-time password (OTP) is used as the second credential. For example, in [4], the user inputs the OTP sent to the smartphone from the authentication server to the authentication server via the PC, which constitutes two-factor authentication.

References

  1. Kaspersky Emotet modules and recent attacks, SECURELIST, Kaspersky (online), 13 April 2022. https://securelist.com/emotet-modules-and-recent-attacks/106290/. Accessed 28 July 2022

  2. Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., Koucheryavy, Y.: Multi-factor authe ntication: a survey. Cryptography 2(1), 1–31 (2018). https://doi.org/10.3390/cryptography2010001

    Article  Google Scholar 

  3. Microsoft: How it works: azure AD multi-factor authentication, Microsoft (online), 8 Feb 2022. https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-mfa-howitworks. Accessed 28 July 2022

  4. Amazon: Adding MFA to a user pool, Amazon (online), 18 Nov 2021. https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-mfa.html. Accessed 23 Dec 2021

  5. Bardram, J.E., Kjær, R.E., Pedersen, M.Ø.: Context-Aware User Authentication – Supporting Proximity-Based Login in Pervasive Computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003: Ubiquitous Computing UbiComp 2003. Lecture Notes in Computer Science LNCS, vol. 2864, pp. 107–123. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-39653-6_8

    Chapter  Google Scholar 

  6. Fathy, M.E., Patel, V.M., Chellappa, R.: Face-based active authentication on mobile devices. In: 2015 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 1687–1691 (2015). https://doi.org/10.1109/ICASSP.2015.7178258

  7. Singh, S., Inamdar, A., Kore, A., Pawar, A.: Analysis of algorithms for user authentication using keystroke dynamics. In: 2020 International Conference on Communication and Signal Processing (ICCSP), pp. 0337–0341 (2020). https://doi.org/10.1109/ICCSP48568.2020.9182115

  8. Tietz, C., Klieme, E., Behrendt, L., Böning, P., Marschke, L., Meinel, C.: Verification of keyboard acoustics authentication on laptops and smartphones using WebRTC. In: 2019 3rd Cybersecurity in Networking Conference (CSNet), pp. 130–137 (2019). https://doi.org/10.1109/CSNet47905.2019.9108962.

  9. Choi, B., Suh, T.: A security program to protect against keyboard-emulating BadUSB. J. Korea Inst. Inf. Secur. Cryptology 26(6), 1483–1492 (2016). https://doi.org/10.13089/JKIISC.2016.26.6.1483

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Masakatsu Nishigaki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nozaki, S. et al. (2022). Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential. In: Barolli, L., Miwa, H., Enokido, T. (eds) Advances in Network-Based Information Systems. NBiS 2022. Lecture Notes in Networks and Systems, vol 526. Springer, Cham. https://doi.org/10.1007/978-3-031-14314-4_20

Download citation

Publish with us

Policies and ethics