Multifactor Authentication
4.3. Proposed MFA Solution for V2X Applications
4.3.1. Factor Mismatch
Assuming that the number of factors in our system is the system secret can be represented in a simplified way as a group of
Here, if any of are modified-the secret recovery mechanism would fail. An improvement to this algorithm is delivered by providing separate system solutions for a lower number of factors collected. Basically, for the number of possible combinations of factors with one missing is equal to four, as follows
The device may thus grant access based on a predefined risk function policy. As the second benefit, it can inform the user (or the authority) that a particular factor has to be updated based on the failed combination. Indeed, this modification brings only marginal transmission overheads, but, on the other hand, enables higher flexibility in authentication and missing factor validation.