2023
DOI: 10.14569/ijacsa.2023.0140119
|View full text |Cite
|
Sign up to set email alerts
|

Current Multi-factor of Authentication: Approaches, Requirements, Attacks and Challenges

Abstract: Now-a-days, with the rapid and broad emergence of local or remote access to services on the internet. Authentication represents an important security control requirement and the MFA is recommended to mitigate the weaknesses in the SFA. MFA techniques can be classified into two main approaches: based biometric and non-biometric approaches. However, there is a problem to maintain the tradeoff between security and accuracy. The studies that have been reviewed on both authentication mechanisms are found contradict… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 48 publications
0
4
0
Order By: Relevance
“…Multi-factor authentication (MFA) solutions, designed for user-friendliness, should be widely adopted, with clear guidance provided on their setup and usage (Mohammed et al, 2023). Collaborative incident response planning involving cross-functional teams and tabletop exercises ensures a coordinated and efficient response to social engineering incidents.…”
Section: Case Study 3: Social Engineering In Influencer Marketingmentioning
confidence: 99%
“…Multi-factor authentication (MFA) solutions, designed for user-friendliness, should be widely adopted, with clear guidance provided on their setup and usage (Mohammed et al, 2023). Collaborative incident response planning involving cross-functional teams and tabletop exercises ensures a coordinated and efficient response to social engineering incidents.…”
Section: Case Study 3: Social Engineering In Influencer Marketingmentioning
confidence: 99%
“…Push authentication requires the user to receive a push notification on their smartphone to approve or deny a login attempt. This method is advantageous because it eliminates the need for users to type in numbers, as required by other 2FA methods, making it both faster and more user-friendly [18]. Additionally, push authentication requires Internet access, which is necessary to keep communication between the user's device and the server secure, such as through TLS.…”
Section: Pushmentioning
confidence: 99%
“…These techniques, including those applied to irises [1], have become integral in contemporary stringent security systems, necessitating user authentication based on cancelable biometrics methods. Iris biometrics, owing to its unique and stable physiological traits, has garnered significant interest over the past decade [2]. Its application in authentication systems stands out as a preferred alternative to traditional methods, reducing reliance on passwords and tokens [3], especially given its irrevocable nature.…”
Section: Introductionmentioning
confidence: 99%