2017 IST-Africa Week Conference (IST-Africa) 2017
DOI: 10.23919/istafrica.2017.8102391
|View full text |Cite
|
Sign up to set email alerts
|

Pick location security: Seamless integrated multi-factor authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…In addition to the three classical factors, somewhere you are or location may be counted as the fourth factor ( Choi & Zage, 2012 ). Low-cost locators such as Bluetooth and GPS can be implemented to track or locate a user physically while authenticating ( Ramatsakane & Leung, 2017 ).…”
Section: Related Workmentioning
confidence: 99%
“…In addition to the three classical factors, somewhere you are or location may be counted as the fourth factor ( Choi & Zage, 2012 ). Low-cost locators such as Bluetooth and GPS can be implemented to track or locate a user physically while authenticating ( Ramatsakane & Leung, 2017 ).…”
Section: Related Workmentioning
confidence: 99%
“…Common also is adding physical location to the authentication through definitions of geofences, such as a defined "home" location. Ramatsakane et al [33] utilized location for improving accuracy of identity determination for authentication purposes.…”
Section: Introductionmentioning
confidence: 99%
“…MFA thus offers security enhancement that allows a user to present two or more pieces of authentication credential when logging in to any account. This can range from something you know (password or PIN), something you have (smart card), or something you are (fingerprint) [ 17 , 18 ]. However, the latest MFA solutions incorporate additional factors which can consider context and behavior when authenticating a user—for instance, the location when logging in, attempted log-in time (such as late at night, for instance), the device being used (either a smartphone or a laptop), as well as the network being used to access (either private, public, or designated IP address range).…”
Section: Introductionmentioning
confidence: 99%
“…The username and password authentication process is the most popular means, despite their security flaws because they are easy to implement and allows the user quick entry to the system. They can be implemented with less computational complexity, speed, and scalability [ 17 ]. Additional devices are required to implement an MFA, which could be expensive, and more computational complexity will be required, which also increases processing time.…”
Section: Introductionmentioning
confidence: 99%