A Novel Approach for Emergency Backup Authentication Using Fourth Factor

  • K. SharmilaEmail author
  • V. Janaki
  • A. Nagaraju
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 8)


In today’s era of improved technology, ease of availability of Internet made every user to access the data at finger tips. Every day transactions are also accomplished online as it is very easy and take less time. Authentication and confidentiality plays a vital role in transmitting the data through the medium of Internet. Authentication is usually implemented through any or all of the authentication factors such as username, password, smart cards, biometrics etc. If the user is unable to provide any of the authentication factors to the system at that instance of time, the user becomes unauthenticated and cannot make any transaction even though, a legitimate user. In this paper we are proposing a new factor for authentication called the fourth factor. This is based on social relations where the legitimate but unauthenticated user can take the help of any trusted third party like a friend, spouse, blood relation who will support in the authentication process in case of failure of credentials. The user can be authenticated with the trusted party and can make a single emergency transaction.


Vouching Trusted platform Social authentication Fourth factor 


  1. 1.
    John Brainard., Ari juels., RonaldRivest L., Michael Szydlo., Moti Yung.: Fourth Factor Authentication: Somebody You Know. ACM, (2010)Google Scholar
  2. 2.
    Schechter S., Egelman S., Reeder R.W.: It’s not what you know, but who you know: A Social Approach to Last-Resort Authentication. ACM SIGCHI, Conference on Human Factors in Computing Systems, (2009)Google Scholar
  3. 3.
    McCune J.M., PerrigA., Reiter M.K., Seeing-is-believing: Using camera phones for human-verifiable authentication. in. IEEE Symposium on Security and Privacy, pp. 110–124, (2005)Google Scholar
  4. 4.
    Xinyi Huang., Yang Ashley Chonka., Jianying Zhou., Robert H. Deng.: A Generic Framework for Three-Factor Authentication Preserving Security and Privacy in Distributed Systems, in. IEEE Xplore, (2011)Google Scholar
  5. 5.
    Wen-Bin Hsieh., Jenq-ShiouLeu., “Design of a time and location based One-Time Password authentication scheme”, 7th International Wireless Communications and Mobile Computing Conference, 978-1-4244-9539-9, (2011)Google Scholar
  6. 6.
    EkoSediyono., Kartika Imam., Santoso., Suhartono., “Secure login by using One-time Password authentication based on MD5 Hash encrypted SMS”, 978-1-4799-2432-5, Aug. (2013)Google Scholar
  7. 7.
    Jiri Sobotka., RadekDolze.: Multifactor Authentication Systems, pp. 1–7, (2010)Google Scholar
  8. 8.
    Clancy C. T., Kiyavash N., Lin D. J.,: Secure Smartcard-Based Fingerprint Authentication, in. Workshop on Biometric Methods and Applications, (2003)Google Scholar
  9. 9.
    Stephen S. Hamilton., Martin C. Carlisle,. John A. Hamilton.: A Global Look at Authentication, in. IEEE SMC Information Assurance Workshop, West Point NY, (2007)Google Scholar
  10. 10.
    Bhargav-Spantzel A., Squicciarini A., ElisaB.: Privacy Preserving Multi-Factor Authentication with Biometrics, pp 63–71, DIM Alexandria Virginia, (2006)Google Scholar
  11. 11.
    GarfinkelS. L., Email-Based Identification and Authentication: An Alternative to PKI, IEEE Computer Society, pp. 20–26, (2003)Google Scholar
  12. 12.
    Jain A., Hong. L., Pankanti. S.: Biometric Identification. In. Communications of the ACM, pp 91–98, (2010)Google Scholar
  13. 13.
    M. C. Chuang and M. C. Chen, “An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics,” Expert Systems with Applications, 41(1):1411–1418, (2014)Google Scholar
  14. 14.
    Chun-Ta Li., Cheng-Chi Lee., Hua-Hsuan Chen., Min-JieSyu., Chun-Cheng Wang., “Cryptanalysis of An Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics”, 978–1-4799-8342-1/15, IEEE 498 ICOIN (2015)Google Scholar
  15. 15.
    FadiAloul., Syed Zahidi., Wassim El-Haj.:Two Factor Authentication Using Mobile Phones, in. IEEE International Conferenceon Computer Systems and Applications, AICCSA, pp. 641–644. (2009)Google Scholar
  16. 16.
    BijanSoleymani., MuthucumaruMaheswaran.: Social Authentication Protocol for Mobile Phones in International Conference on Computational Science and Engineering, (2009)Google Scholar
  17. 17.
    RSASecureID Authenticators:
  18. 18.
    Yardi S., Feamster., Bruckman A.,: Photo-based authentication using social networks In WOSN, (2008)Google Scholar
  19. 19.
    RituPahal., Vikaskumar.,: Efficient Implementation of AES.,: International Journal of Advanced Research in Computer Science and Software Engineering, 3,7, (2013)Google Scholar
  20. 20.
    Xiao-Min Wang., Wen-Fang Zhang., Jia-Shu Zhang., Muhammad Khurram Khan.: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards, (2007)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of CSEAurora’s Research and Technological InstituteWarangalIndia
  2. 2.Department of CSEVaagdevi College of EngineeringWarangalIndia
  3. 3.Department of CSECentral University of RajasthanAjmerIndia

Personalised recommendations