TUTCRIS - Tampereen teknillinen yliopisto

TUTCRIS

Multi-factor authentication: A survey and challenges in V2X applications

Tutkimustuotosvertaisarvioitu

Standard

Multi-factor authentication: A survey and challenges in V2X applications. / Ometov, A.; Bezzateev, S.

2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2017. s. 129-136.

Tutkimustuotosvertaisarvioitu

Harvard

Ometov, A & Bezzateev, S 2017, Multi-factor authentication: A survey and challenges in V2X applications. julkaisussa 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, Sivut 129-136, 1/01/00. https://doi.org/10.1109/ICUMT.2017.8255200

APA

Ometov, A., & Bezzateev, S. (2017). Multi-factor authentication: A survey and challenges in V2X applications. teoksessa 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) (Sivut 129-136). IEEE. https://doi.org/10.1109/ICUMT.2017.8255200

Vancouver

Ometov A, Bezzateev S. Multi-factor authentication: A survey and challenges in V2X applications. julkaisussa 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE. 2017. s. 129-136 https://doi.org/10.1109/ICUMT.2017.8255200

Author

Ometov, A. ; Bezzateev, S. / Multi-factor authentication: A survey and challenges in V2X applications. 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2017. Sivut 129-136

Bibtex - Lataa

@inproceedings{7315ee0d53b14f6c9b15402dd7702317,
title = "Multi-factor authentication: A survey and challenges in V2X applications",
abstract = "Today, the digitalization strides tremendously on all the sides of the modern society. One of the enablers to keep this process secure is the authentication. It touches many different areas of the connected world including payments, communications, and access right management. This manuscript attempts to shed the light on the authentication systems' evolution towards Multi-factor Authentication (MFA) from Singlefactor Authentication (SFA) and through Two-factor Authentication (2FA). Particularly, MFA is expected to be utilized for the user and vehicle-to-everything (V2X) interaction which is selected as descriptive scenario. The manuscript is focused on already available and potentially integrated sensors (factor providers) to authenticate the occupant from inside the vehicle. The survey on existing vehicular systems suitable for MFA is given. Finally, the MFA system based on reversed Lagrange polynomial, utilized in Shamir's Secret Sharing (SSS), was proposed to enable flexible in-car authentication. The solution was further extended covering the cases of authenticating the user even if some of the factors are mismatched or absent. The framework allows to qualify the missing factor and authenticate the user without providing the sensitive biometric data to the verification entity. The proposed is finally compared to conventional SSS.",
keywords = "Authentication, Automobiles, Cryptography, Face recognition, Sensors",
author = "A. Ometov and S. Bezzateev",
note = "jufoid=72315",
year = "2017",
month = "11",
day = "1",
doi = "10.1109/ICUMT.2017.8255200",
language = "English",
publisher = "IEEE",
pages = "129--136",
booktitle = "2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)",

}

RIS (suitable for import to EndNote) - Lataa

TY - GEN

T1 - Multi-factor authentication: A survey and challenges in V2X applications

AU - Ometov, A.

AU - Bezzateev, S.

N1 - jufoid=72315

PY - 2017/11/1

Y1 - 2017/11/1

N2 - Today, the digitalization strides tremendously on all the sides of the modern society. One of the enablers to keep this process secure is the authentication. It touches many different areas of the connected world including payments, communications, and access right management. This manuscript attempts to shed the light on the authentication systems' evolution towards Multi-factor Authentication (MFA) from Singlefactor Authentication (SFA) and through Two-factor Authentication (2FA). Particularly, MFA is expected to be utilized for the user and vehicle-to-everything (V2X) interaction which is selected as descriptive scenario. The manuscript is focused on already available and potentially integrated sensors (factor providers) to authenticate the occupant from inside the vehicle. The survey on existing vehicular systems suitable for MFA is given. Finally, the MFA system based on reversed Lagrange polynomial, utilized in Shamir's Secret Sharing (SSS), was proposed to enable flexible in-car authentication. The solution was further extended covering the cases of authenticating the user even if some of the factors are mismatched or absent. The framework allows to qualify the missing factor and authenticate the user without providing the sensitive biometric data to the verification entity. The proposed is finally compared to conventional SSS.

AB - Today, the digitalization strides tremendously on all the sides of the modern society. One of the enablers to keep this process secure is the authentication. It touches many different areas of the connected world including payments, communications, and access right management. This manuscript attempts to shed the light on the authentication systems' evolution towards Multi-factor Authentication (MFA) from Singlefactor Authentication (SFA) and through Two-factor Authentication (2FA). Particularly, MFA is expected to be utilized for the user and vehicle-to-everything (V2X) interaction which is selected as descriptive scenario. The manuscript is focused on already available and potentially integrated sensors (factor providers) to authenticate the occupant from inside the vehicle. The survey on existing vehicular systems suitable for MFA is given. Finally, the MFA system based on reversed Lagrange polynomial, utilized in Shamir's Secret Sharing (SSS), was proposed to enable flexible in-car authentication. The solution was further extended covering the cases of authenticating the user even if some of the factors are mismatched or absent. The framework allows to qualify the missing factor and authenticate the user without providing the sensitive biometric data to the verification entity. The proposed is finally compared to conventional SSS.

KW - Authentication

KW - Automobiles

KW - Cryptography

KW - Face recognition

KW - Sensors

U2 - 10.1109/ICUMT.2017.8255200

DO - 10.1109/ICUMT.2017.8255200

M3 - Conference contribution

SP - 129

EP - 136

BT - 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)

PB - IEEE

ER -