{"title":"A Survey on User Authentication Factors","authors":"A. A. AlQahtani, Zakaria El-Awadi, Manki Min","doi":"10.1109/iemcon53756.2021.9623159","DOIUrl":null,"url":null,"abstract":"Today, digital information decisively permeates all aspects of modern society. In such a connected world, one of the critical factors in maintaining the security of transmitted data is user authentication, which establishes confidence in the user identities presented to an information system. Over time, the definition of user authentication has not changed; however, a simple password is no longer the only factor used for authenticating a user. Two-factor Authentication (2FA) and Multi-factor Authentication (MFA) were proposed to provide a high level of security by adding more than one layer of authentication. For the most part, these layers of Authentication are based on knowledge, ownership, biometrics, and/or users' behaviors. This paper presents and analyzes authentication factors that are utilized to authenticate a user and prove his/her identity to a resource.","PeriodicalId":272590,"journal":{"name":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iemcon53756.2021.9623159","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Today, digital information decisively permeates all aspects of modern society. In such a connected world, one of the critical factors in maintaining the security of transmitted data is user authentication, which establishes confidence in the user identities presented to an information system. Over time, the definition of user authentication has not changed; however, a simple password is no longer the only factor used for authenticating a user. Two-factor Authentication (2FA) and Multi-factor Authentication (MFA) were proposed to provide a high level of security by adding more than one layer of authentication. For the most part, these layers of Authentication are based on knowledge, ownership, biometrics, and/or users' behaviors. This paper presents and analyzes authentication factors that are utilized to authenticate a user and prove his/her identity to a resource.