Abstract
Protection of critical data is one of the greatest challenges in any organization around the globe, especially for the intelligence community. Managing data, assets and resources require strong security method such as the authentication process that can guarantee only designated person will be receiving the required information. Any breach of information and assets could risk in the nation’s sovereignty and give significant impacts in social, political, economy and diplomacy or even lives. Authentication method enables intelligence data to be transferred covertly and the access to the system by a legitimate user is guaranteed, hence the elements of confidentiality, integrity, and availability of the data is assured. This study analyzed various authentication methods used to secure multiple platforms of data and system. This study serves as theoretical analysis on multi-factor authentication model for intelligence community access to critical surveillance data. This study aims to propose the enhance model that could be used as a basis to build a framework of the secured authentication system to avoid common attack on authentication and access management.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pomerleau, M.: How technology has changed intelligence collection – Defense Systems (2015) https://defensesystems.com/articles/2015/04/22/technology-has-changed-intelligence-gathering.aspx. Accessed 20 June 2019
Van Puyvelde, D., Coulthart, S., Hossain, M.S.: Beyond the buzzword: big data and national security decision-making. Int. Aff. 93(6), 1397–1416 (2017)
Odom, W.E.: Intelligence analysis. Intell. Natl. Secur. 23(3), 316–332 (2008)
Gandhi, P., Sharma, A., Mahoney, A., Sousan, W., Zhu, W., Laplante, P.: Dimensions of cyber-attacks: cultural, social, economic, and political. Technol. Soc. Mag. IEEE 30, 28–38 (2011)
National Security Act of 1947. https://www.dni.gov/index.php/ic-legal-reference-book/national-security-act-of-1947. Accessed 20 June 2019
Raza, M., Iqbal, M., Sharif, M., Haider, W.: A survey of password attacks and comparative analysis on methods for secure authentication. World Appl. Sci. J. 19(4), 439–444 (2012)
Arjun, G.S., Rashmi, P.D., Arjun, G.S., Rashmi, P.D.: One Time Keyboard (OTK) Authentication. Int. J. Innov. Res. Sci. Technol. 4(1) 173–177 (2017)
Ong, L.: Awareness of information security risks : an investigation of people aspects (a study in Malaysia), pp. 1–256 (2015)
Hastings, N., Dempsey, K., Paulsen, C.: Considerations for identity management in public safety mobile networks. US Department of Commerce, National Institute of Standards and Technology (2015)
Sharma, D.H., Dhote, C.A., Potey, M.M.: Identity and access management as security-as-a-service from clouds. Proc. Comput. Sci. 79, 170–174 (2016)
Ferrag, M.A., Maglaras, L., Derhab, A.: Authentication and authorization for mobile IoT devices using bio-features: recent advances and future trends 2019 (2019)
Opris, V.N.: Biometric multi-factor authentication scheme in cloud computing. Sci. Bull. Nav. Acad. 19(1), 472–475 (2016)
Nwabueze, E.E., Obioha, I., Onuoha, O.: Enhancing multi-factor authentication in modern computing. Commun. Netw. 06(03), 172–178 (2017)
J. Task Force Transformation Initiative, “NIST Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Organizations
Libicki, M.C., Jackson, B.A., Rudavsky, R., Webb, K.W.: Influences on the adoption of multifactor authentication. J. Natl. Cancer Inst. 92(23), 1872(2000)
Lal, N.A., Prasad, S., Farik, M.: A review of authentication methods. Int. J. Sci. Technol. Res. 5(11), 246–249 (2016)
Waters, T.: Multifactor authentication – a new chain of custody option for military logistics. Cyber Def. Rev. 2(3), 1–14 (2017)
Lee, J.: Defense department developing multifactor authentication system—Biometric Update (2017). https://www.biometricupdate.com/201706/defense-department-developing-multifactor-authentication-system. Accessed 20 June 2019
Jasiul, B., Sliwa, J., Piotrowski, R., Goniacz, R., Amanowicz, M.: Authentication and Authorization of Users and Services in Federated SOA Environments-Challenges and Opportunities
Shila, D.M., Srivastava, K., O’Neill, P., Reddy, K., Sritapan, V.: A multi-faceted approach to user authentication for mobile devices—using human movement, usage, and location patterns. In: 2016 IEEE Symposium on Technologies for Homeland Security (HST), pp. 1–6 (2016)
Soimart, L., Mookdarsanit, P.: Multi-factor authentication protocol for information accessibility in flash drive. In: 9th Applied Computer Technology Information System (2016)
Singh, S.: Multi-factor authentication and their approaches. Int. Res. J. Manag. IT Soc. Sci. 4(3), 68–81 (2017)
Mihailescu, D.M.I., Racuciu, C., Grecu, D.L., Nita, L.S.: A multi-factor authentication scheme including biometric characteristics as one factor. Mircea cel Batran Nav. Acad. Sci. Bull. 17(1), 348–352 (2015)
Podilchuk, C., Barinov, W., Hulbert, W., Jairaj, A.: Face recognition in a tactical environment. In: 2010-MILCOM 2010 Military Communications Conference, pp. 900–905 (2010)
Venukumar, V., Pathari, V.: Multi-factor authentication using threshold cryptography. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1694–1698 (2016)
Souza, D.F.L., Burlamaqui, A.M.F., Souza Filho, G.L.: A multi factor authentication approach based on biometrics, optical interference and chaotic maps. IEEE Lat. Am. Trans. 15(9), 1700–1708 (2017)
Kim, S.-P., Kang, J.-H., Jo, Y.C., Oakley, I.: Development of a multi-modal personal authentication interface. In: 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 712–715 (2017)
Taher, K.A., Nahar, T., Hossain, S.A.: Enhanced cryptocurrency security by time-based token multi-factor authentication algorithm. In: 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), pp. 308–312 (2019)
Oke, B.A., Olaniyi, O.M., Aboaba, A.A., Arulogun, O.T.: Developing multifactor authentication technique for secure electronic voting system. In: 2017 International Conference on Computing Networking and Informatics (ICCNI), pp. 1–6 (2017)
Liu, Y., Zhong, Q., Chang, L., Xia, Z., He, D., Cheng, C.: A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5), 250–255 (2016)
Theofanos, M., Garfinkel, S., Choong, Y.-Y.: Secure and usable enterprise authentication: lessons from the field. IEEE Secur. Priv. 14(5), 14–21 (2016)
Banyal, R.K., Jain, P., Jain, V.K.: Multi-factor authentication framework for cloud computing. In: 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation, pp. 105–110 (2013)
Khan, S.H., Akbar, M.A., Shahzad, F., Farooq, M., Khan, Z.: Secure biometric template generation for multi-factor authentication. Pattern Recogn. 48(2), 458–472 (2015)
Jiang, Q., Chen, Z., Li, B., Shen, J., Yang, L., Ma, J.: Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J. Ambient Intell. Humaniz. Comput. 9(4), 1061–1073 (2018)
Ray, P.P., Mukherjee, M., Shu, L.: Internet of Things for disaster management: state-of-the-art and prospects. IEEE Access 5(i), 18818–18835 (2017)
Intelligence Community Information Environment (IC IE) Data Strategy 2017-2021 (2017). https://www.dni.gov/files/documents/CIO/Data-Strategy_2017-2021_Final.pdf
Ben-Zahia, M.A., Jaluta, I.: Criteria for selecting software development models. In: GSCIT 2014 - Global Summit on Computer and Information Technology, pp. 1–6 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wan Muhamad, W.N. et al. (2019). Enhance Multi-factor Authentication Model for Intelligence Community Access to Critical Surveillance Data. In: Badioze Zaman, H., et al. Advances in Visual Informatics. IVIC 2019. Lecture Notes in Computer Science(), vol 11870. Springer, Cham. https://doi.org/10.1007/978-3-030-34032-2_49
Download citation
DOI: https://doi.org/10.1007/978-3-030-34032-2_49
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34031-5
Online ISBN: 978-3-030-34032-2
eBook Packages: Computer ScienceComputer Science (R0)