2012 IEEE International Carnahan Conference on Security Technology (ICCST) 2012
DOI: 10.1109/ccst.2012.6393550
|View full text |Cite
|
Sign up to set email alerts
|

Addressing insider threat using “where you are” as fourth factor authentication

Abstract: Current physical and cybersecurity systems have been relying on traditional three factor authentication to mitigate the threats posed by insider attacks. Typically, systems use one or two of the following factors to authenticate end-users: what you know (e.g., password), what you have (e.g., RSA ID), or what you are (e.g., fingerprint). Systems based on these factors have the following limitations: 1) access is typically bound to a single authentication occurrence leading to remote vulnerabilities, 2) the fact… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…All three factors can be blended successfully in general, but cost effectiveness should be considered (Abiew, Jnr & Banning, 2020). In addition to the three classical factors, somewhere you are or location may be counted as the fourth factor (Choi & Zage, 2012). Low-cost locators such as Bluetooth and GPS can be implemented to track or locate a user physically while authenticating (Ramatsakane & Leung, 2017).…”
Section: Related Workmentioning
confidence: 99%
“…All three factors can be blended successfully in general, but cost effectiveness should be considered (Abiew, Jnr & Banning, 2020). In addition to the three classical factors, somewhere you are or location may be counted as the fourth factor (Choi & Zage, 2012). Low-cost locators such as Bluetooth and GPS can be implemented to track or locate a user physically while authenticating (Ramatsakane & Leung, 2017).…”
Section: Related Workmentioning
confidence: 99%
“…Out of these, 217 propose the use of inherence-based authentication schemes, whereas 169 propose the use of possession-based schemes and 124 the use of knowledge-based ones. The remaining 5 articles propose the use of schemes based on other authentication factors, such as the use of the user's social networks [21] and location-based authentication [22]. Table 3 shows the number of articles proposing the use of the distinct authentication schemes, split by the authentication factors to which they belong.…”
Section: Authentication Schemesmentioning
confidence: 99%
“…Almost all of these solutions utilize difference of signal strength (DSS) techniques to estimate proximity. Unfortunately, DSS is highly susceptible to multi-path and reflection problems due to heterogeneous building structures and reflective materials making it difficult to ascertain accurate location information [1].…”
Section: Embers For Fourth Factor Authenticationmentioning
confidence: 99%
“…In order to mitigate the identified limitations, we proposed the usage of "where you are" as a complementary fourth factor that can significantly improve both cybersecurity and physical security [1]. RTLSs have been largely used as means of tracking manufacturing process [2], [3] but their performance, integrity and assurance as a security and safety tool is unknown.…”
Section: Introductionmentioning
confidence: 99%