Tampere University of Technology

TUTCRIS Research Portal

Multi-factor authentication: A survey and challenges in V2X applications

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review


Original languageEnglish
Title of host publication2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
Number of pages8
ISBN (Electronic)978-1-5386-3435-6
Publication statusPublished - 1 Nov 2017
Publication typeA4 Article in a conference publication
EventInternational Conference on Ultra Modern Telecommunications and Control Systems and Workshops -
Duration: 1 Jan 1900 → …

Publication series

ISSN (Print)2157-023X


ConferenceInternational Conference on Ultra Modern Telecommunications and Control Systems and Workshops
Period1/01/00 → …


Today, the digitalization strides tremendously on all the sides of the modern society. One of the enablers to keep this process secure is the authentication. It touches many different areas of the connected world including payments, communications, and access right management. This manuscript attempts to shed the light on the authentication systems' evolution towards Multi-factor Authentication (MFA) from Singlefactor Authentication (SFA) and through Two-factor Authentication (2FA). Particularly, MFA is expected to be utilized for the user and vehicle-to-everything (V2X) interaction which is selected as descriptive scenario. The manuscript is focused on already available and potentially integrated sensors (factor providers) to authenticate the occupant from inside the vehicle. The survey on existing vehicular systems suitable for MFA is given. Finally, the MFA system based on reversed Lagrange polynomial, utilized in Shamir's Secret Sharing (SSS), was proposed to enable flexible in-car authentication. The solution was further extended covering the cases of authenticating the user even if some of the factors are mismatched or absent. The framework allows to qualify the missing factor and authenticate the user without providing the sensitive biometric data to the verification entity. The proposed is finally compared to conventional SSS.


  • Authentication, Automobiles, Cryptography, Face recognition, Sensors

Publication forum classification

Downloads statistics

No data available