Metric based technique in multi-factor authentication system with artificial intelligence technologies

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

The metric based authentication system have found a lot of applications in systems such as the banking and immigration point based systems used in several countries such the United Kingdom, Australia and Canada. Scoring based authentication system is also widely used in biometrics authentication systems. In this paper, we extend the metric based authentication system to come up with a web based multi-factor authentication system. The system uses four identity attributes with artificial neural networks (ANN) used to fuse the metrics values in an information fusion system. Levenberg-Marquardt Optimization is used to update the neural weights and bias while trainln is used to train the ANN information fusion system. Delaunay triangulation technique is used for the fingerprint detection algorithm.

Original languageEnglish
Title of host publicationFuture Wireless Networks and Information Systems
Pages89-97
Number of pages9
EditionVOL. 1
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event2011 International Conference on Future Wireless Networks and Information Systems, ICFWI 2011 - Macao, China
Duration: 30 Nov 20111 Dec 2011

Publication series

NameLecture Notes in Electrical Engineering
NumberVOL. 1
Volume143 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference2011 International Conference on Future Wireless Networks and Information Systems, ICFWI 2011
Country/TerritoryChina
CityMacao
Period30/11/111/12/11

Keywords

  • artificial intelligence
  • Delaunay triangulation
  • Identity attributes metrics
  • multi-factor authentication

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'Metric based technique in multi-factor authentication system with artificial intelligence technologies'. Together they form a unique fingerprint.

Cite this