Dragan Korać , Boris Damjanović , Dejan Simić , Cong Pu
{"title":"Management of evaluation processes and creation of authentication metrics: Artificial intelligence-based fusion framework","authors":"Dragan Korać , Boris Damjanović , Dejan Simić , Cong Pu","doi":"10.1016/j.ipm.2025.104233","DOIUrl":null,"url":null,"abstract":"<div><div>While the literature extensively covers various authentication systems, management of evaluation processes and creation of authentication metrics remain significant information challenges for researchers. To overcome this complex challenge, we present a taxonomy of research processes based on fusion and fuzzy strategies and give an overview and comparison of related studies. Specifically, we develop an artificial intelligence-based fusion framework (<em>f<sub>f</sub></em>) incorporating Mamdani-type fuzzy rules and key user factors: security, privacy, and trust. Its uniqueness and innovation lie in the application of trapezoidal functions to describe these factors as key input metric values. Moreover, we are the first to incorporate trust as an independent comparative factor and provide a comparison of traditional and modern authentication methods, including artificial intelligence (AI), electroencephalogram (EEG), electrocardiographic (ECG), and photoplethysmogram (PPG) methods. Also, we use a workflow diagram to define the topological relationships among user factors and authentication factors, clarifying the role of fusion in multi-factor authentication (MFA) approaches. In comparison to other similar frameworks implemented solely for traditional methods, the proposed <em>f<sub>f</sub></em> yields better and more realistic quantification metric results. In addition, we present and discuss the key mathematical differences between one-factor authentication (1FA) and MFA, aiming to shed light on issues such as complexity and bias. Lastly, the developed <em>f<sub>f</sub></em> not only advances MFA metrics by introducing modern authentication methods such as AI, EEG, ECG, and PPG but also paves the way for future research on how and why AI algorithms need to be incorporated into information processing and the creation of strong MFA solutions.</div></div>","PeriodicalId":50365,"journal":{"name":"Information Processing & Management","volume":"62 6","pages":"Article 104233"},"PeriodicalIF":6.9000,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Processing & Management","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0306457325001748","RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
While the literature extensively covers various authentication systems, management of evaluation processes and creation of authentication metrics remain significant information challenges for researchers. To overcome this complex challenge, we present a taxonomy of research processes based on fusion and fuzzy strategies and give an overview and comparison of related studies. Specifically, we develop an artificial intelligence-based fusion framework (ff) incorporating Mamdani-type fuzzy rules and key user factors: security, privacy, and trust. Its uniqueness and innovation lie in the application of trapezoidal functions to describe these factors as key input metric values. Moreover, we are the first to incorporate trust as an independent comparative factor and provide a comparison of traditional and modern authentication methods, including artificial intelligence (AI), electroencephalogram (EEG), electrocardiographic (ECG), and photoplethysmogram (PPG) methods. Also, we use a workflow diagram to define the topological relationships among user factors and authentication factors, clarifying the role of fusion in multi-factor authentication (MFA) approaches. In comparison to other similar frameworks implemented solely for traditional methods, the proposed ff yields better and more realistic quantification metric results. In addition, we present and discuss the key mathematical differences between one-factor authentication (1FA) and MFA, aiming to shed light on issues such as complexity and bias. Lastly, the developed ff not only advances MFA metrics by introducing modern authentication methods such as AI, EEG, ECG, and PPG but also paves the way for future research on how and why AI algorithms need to be incorporated into information processing and the creation of strong MFA solutions.
期刊介绍:
Information Processing and Management is dedicated to publishing cutting-edge original research at the convergence of computing and information science. Our scope encompasses theory, methods, and applications across various domains, including advertising, business, health, information science, information technology marketing, and social computing.
We aim to cater to the interests of both primary researchers and practitioners by offering an effective platform for the timely dissemination of advanced and topical issues in this interdisciplinary field. The journal places particular emphasis on original research articles, research survey articles, research method articles, and articles addressing critical applications of research. Join us in advancing knowledge and innovation at the intersection of computing and information science.