The Effectiveness of Multi-Factor Authentication (MFA) in Reducing Unauthorized Access: A Systematic Literature Review
Keywords:
Multi-Factor Authentication, Security, Unauthorized Access, Systematic Literature Review, Information systems.Abstract
Multi-Factor Authentication (MFA) has become one of the key solutions in improving the security of information systems by reducing the possibility of unauthorized access. This article presents the results of a systematic literature review to evaluate the effectiveness of MFA in the context of reducing unauthorized access. Using a rigorous search methodology, this article aims to answer existing research questions, determine inclusion and exclusion criteria, and analyze findings that have been collected from various scientific sources.
References
Y. X. Tok, N. Katuk, and A. S. C. M. Arif, “Smart Home Multi-Factor Authentication Using Face Recognition and One-Time Password on
Smartphone,” International Journal of Interactive Mobile Technologies (Ijim), vol. 15, no. 24, pp. 32–48, 2021, doi:10.3991/ijim.v15i24.25393.
J. J. D. Rivera, A. Muhammad, and W. Song, “Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy Focused Multi-Factor Authentication,” Ieee Open Journal of the Communications Society, vol. 5, pp. 2792–2814, 2024, doi:
10.1109/ojcoms.2024.3391728.
R. Shah and S. Dubey, “Multi User Authentication for Reliable Data Storage in Cloud Computing,”International Journal of Scientific Research in Computer Science Engineering and Information Technology, vol. 10, no. 2, pp. 82–89, 2024, doi:10.32628/cseit2410138.
A. M. Aburbeian and M. Fernández‐Veiga, “Secure Internet Financial Transactions: A Framework Integrating Multi-Factor Authentication and Machine Learning,” To, vol. 5, no. 1, pp. 177–194, 2024, doi: 10.3390/ai5010010.
D. Carrillo-Torres, J. A. P. Díaz, J. A. Cantoral-Ceballos, and C. Vargas‐Rosales, “A Novel Multi-Factor Authentication Algorithm Based on Image Recognition and User Established Relations,”Applied Sciences, vol. 13, no. 3, p. 1374, 2023, doi:10.3390/app13031374.
S. Bhat and A. Kavasseri, “Enhancing Security for Robot-Assisted Surgery Through Advanced Authentication Mechanisms Over 5G Networks,”European Journal of Engineering and Technology Research, vol. 8, no. 4, pp. 1–4, 2023, doi:10.24018/ejeng.2023.8.4.3064.
J. Williamson and K. Curran, “The Role of Multi-Factor Authentication for Modern Day Security,”Semiconductor Science and Information Devices, vol. 3, no. 1, pp. 16–23, 2021, doi:10.30564/ssid.v3i1.3152.
L. Wu, Y. Wen, and J. Yi, “A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication,” Entropy, vol. 26, no. 8, p. 667,
2024, doi: 10.3390/e26080667.
S. Amft et al., “‘We’ve Disabled MFA for You’: An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments,” pp.3138–3152, 2023, doi: 10.1145/3576915.3623180.
D. Preuveneers, S. Joos, and W. Joosen, “Authguide: analyzing security, privacy and usability trade-offs in multi-factor authentication BT - Lecture Notes in Computer Science,” 2021, pp. 155–170. doi:10.1007/978-3-030-86586-3_11.
A. Verma, V. Moghaddam, and A. Anwar, “Data-Driven Behavioural Biometrics for Continuous and Adaptive User Verification Using Smartphone and Smartwatch,” Sustainability, vol. 14, no. 12, p. 7362, 2022, doi: 10.3390/su14127362.
Y. Xu, X. Jian, T. Li, S. Zou, and B. Li, “Blockchain-Based Authentication Scheme With an Adaptive Multi-Factor Authentication Strategy,” Mobile Information Systems, vol. 2023, pp. 1–13, 2023, doi:10.1155/2023/4764135.
M. Xiao, Y. Chen, Z. Li, Q. Chen, and R. Xu, “Proving Mutual Authentication Property of Industrial Internet of Things Multi-Factor Authentication Protocol Based on Logic of Events,”Electronics (Basel), vol. 13, no. 1, p. 177, 2023, doi:10.3390/electronics13010177.
J. Han, “CNN-Based Multi-Factor Authentication System for Mobile Devices Using Faces and Passwords,” Applied Sciences, vol. 14, no. 12, p.5019, 2024, doi: 10.3390/app14125019.
A. Leevik, V. Davydov, and S. Bezzateev, “Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices, Cryptography, vol. 7, no. 3, p. 33, 2023, doi:10.3390/cryptography7030033.
Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.