Skip to main content

2017 | Buch

Advances in User Authentication

insite
SUCHEN

Über dieses Buch

This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, etc. The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, etc. Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Authentication Basics
Key to the kingdom – Access a Computing System
Abstract
This chapter covers the basic protection mechanism against unauthorized access to a computing system, known as Authentication.
Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Chapter 2. Biometric Authentication
Authentication through human characteristics
Abstract
This chapter focuses on the biometric authentication process which helps to prevent unauthorized access to computing resources. This chapter focuses on the biometric authentication process which helps to prevent unauthorized access to computing resources. First, biometric authentication steps are discussed, and then the performance of each biometric modality is illustrated. Next sections provide details of physiological and behavioral biometrics along with the available applications where these authentication techniques are in wide used. The last section of the chapter discusses different known attacks of biometric systems along with possible remedies for each of them.
Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Chapter 3. Negative Authentication Systems
Who am I? “I am not this; no, nor am I this, nor this,” then which remains is the identity of I
Abstract
Password-based authentication systems are the oldest and most popular among all authentication methods.
Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Chapter 4. Pseudo-Passwords and Non-textual Approaches
Beyond passwords—graphical authentication
Abstract
This chapter describes various complementary approaches of passwords, namely, Honeywords, Cracking-Resistant Password Vaults using Natural Encoders, Bloom Filter, and non-textual and graphical passwords to protect user identities against any type of credential breaches. At the end, a comparison of various non-textual passwords is provided by highlighting their strength and weaknesses.
Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Chapter 5. Multi-Factor Authentication
More secure approach towards authenticating individuals
Abstract
Multi-Factor authentication (MFA) is a secure process of authentication which requires more than one authentication technique chosen from independent categories of credentials. Like single factor, multi-factor is increasingly used to verify the users’ identities in accessing the cyber system and information. MFA combines two or more types of authentication to provide better and secure way of authenticating users.
Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Chapter 6. Continuous Authentication
Authenticating individuals frequently during sessions to assure valid identity
Abstract
Users are now all time connected to the cyber world through different devices and media. It has become essential to check regularly (by monitoring the system and user behavior) whether the user who logged on with valid credential is the same person currently accessing/using resources.
Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Chapter 7. Adaptive Multi-factor Authentication
Bring dynamicity in multi-factor authentication process
Abstract
With the advancements of modern technology, most user activities rely upon various online services, which need to be trusted and secured to prevent the thorny issue of illegal access. Authentication is the primary defense to address the growing need of authentications, though a single-factor (user id and password, for example) is suffering from some significant pitfalls as mentioned in earlier chapters.
Dipankar Dasgupta, Arunava Roy, Abhijit Nag
Backmatter
Metadaten
Titel
Advances in User Authentication
verfasst von
Dipankar Dasgupta
Arunava Roy
Abhijit Nag
Copyright-Jahr
2017
Electronic ISBN
978-3-319-58808-7
Print ISBN
978-3-319-58806-3
DOI
https://doi.org/10.1007/978-3-319-58808-7

Premium Partner