Open Access Open Access  Restricted Access Subscription or Fee Access

A Review on Multi-Bio-Authentication System and Analysis of Security

Markus Reischl, K. Julisch

Abstract


Authentication is the emerging process of identifying a user's uniqueness. It is a procedure of merging an incoming request with a set of known authentications. The identifications which are provided to authorize users are stored in a database on a local operating system or the server of authentication. Security system will search all the objects from the facts that it knows and discover the exact one of which the actual user is presently applied. An original user can be related with other conceptual user object in the system, and therefore the permissions and rights to the user is granted and that user identity is the main evidence to the system which is provided by user. The procedure of determining the rights of user offered evidence is referred as authentication and the throughout process of authentication is termed as credentials. To implement the security multi factor authentication system, there are multiple authentication methods available. Now a days an effective authentication system is provided by using the security concept of one time password and biometric system.

Keywords


Bio Security, Secure Authentication, Fingerprint Biometric.

Full Text:

PDF

References


Amish shah et el. “Shoulder surfing resistant graphical password system,” Procedia Computer Science, 45 (Elsevier), pp. 477 – 484, 2015.

Bud, Andrew, and Andrew Newell. "Biometric Methods for Online User Authentication." U.S. Patent Application No. 16/231,928.

Bui, Thanh, et al. "Man-in-the-machine: exploiting ill-secured communication inside the computer." 27th {USENIX} Security Symposium ({USENIX} Security 18). 2018.

Chau, Lam Ko. "Method and system for fingerprint encoding and authentication." U.S. Patent No. 6,757,411. 29 Jun. 2004.

Gao, Q. (2012). Using IP addresses as assisting tools to identify collusions. International Journal of Business, Humanities and Technology, 2(1), 70-75.

Garrett, Peter, and Paul Regen. "Hand-held electronics device for aggregation of and management of personal electronic data." U.S. Patent No. 9,536,238. 3 Jan. 2017.

Gunaseeli, L., and R. Aroul Canessane. "Graphical passwords implies on tolerance password, image choice, and puzzle login security." 2017 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2017.

Hamidi, Hodjat. "An approach to develop the smart health using Internet of Things and authentication based on biometric technology." Future generation computer systems 91 (2019): 434-449.

Havenetidis, K. "Encryption and Biometrics: Context, methodologies and perspectives of biological data." Journal of Applied Mathematics and Bioinformatics 3.4 (2013): 141.

Hrašna, Marek. Support for U2F FIDO tokens in mobile applications. Diss. Masarykova univerzita, Fakulta informatiky, 2019.

Huang, Xinyi, et al. "A generic framework for three-factor authentication: Preserving security and privacy in distributed systems." IEEE Transactions on Parallel and Distributed Systems 22.8 (2010): 1390-1397.

King, C. G., Guyette, R. W., & Piotrowski, C. (2009). Online exams and cheating: An empirical analysis of business student’s views. The Journal of Educators Online, 6(1), 1-11.

Kursun, Eren, et al. "Systems and methods for high fidelity multi-modal out-of-band biometric authentication through vector-based multi-profile storage." U.S. Patent No. 10,303,964. 28 May 2019.

Liou, Jing-Chiou, and Sujith Bhashyam. "A feasible and cost effective two-factor authentication for online transactions." The 2nd International Conference on Software Engineering and Data Mining. IEEE, 2010.

Makransky, G., & Glas, C. A. (2011). Unproctored internet test verification: Using adaptive confirmation testing. Organizational Research Methods, 14(4), 608-630.

Marais, E., Argles, D., & Von Solms, S. H. (2006) Security issues specific to e-assessments. Proceedings of the 8th Annual Conference on WWW Applications.

MatijaBumbak,” Analysis of potential RFID security problems in supply chains and ways to avoid them”, Master thesis, May 2005.

Nguyen, Dat Tien, et al. "Spoof detection for finger-vein recognition system using NIR camera." Sensors 17.10 (2017): 2261.

Yang, Guomin, et al. "Two-factor mutual authentication based on smart cards and passwords." Journal of computer and system sciences 74.7 (2008): 1160-1172.

Ziqing Mao, Dinei Florencio, and Cormac Herley “Painless Migration from Passwords to Two Factor Authentication” in 'WIFS' , IEEE, Brazil, pp. 1-6, Nov 29th-Dec 2nd, 2011


Refbacks

  • There are currently no refbacks.