Adaptive Multi-Factor Authentication With Federated and Temporal Learning: A Survey

Online First: 08/05/2026

Authors

Corressponding author's email:

2591309@student.hcmute.edu.vn

DOI:

https://doi.org/10.54644/jte.2026.2075

Keywords:

Adaptive Multi-Factor Authentication (Adaptive MFA), Federated Learning, Temporal Graph Learning, Authentication Security, Risk-Based Authentication

Abstract

Multi-Factor Authentication (MFA) has become a fundamental security mechanism for protecting modern information systems against credential-based attacks. While empirical studies have demonstrated that MFA significantly reduces account compromise, most deployed solutions rely on static authentication policies that introduce unnecessary user friction and remain vulnerable to advanced attacks such as phishing proxies and MFA fatigue. To address these limitations, adaptive and risk-based authentication mechanisms have been proposed, but they commonly depend on centralized data collection and centralized machine learning, raising serious concerns regarding privacy, scalability, and regulatory compliance. This survey provides a comprehensive review of adaptive MFA systems with a particular focus on Federated Learning (FL) as a privacy-preserving alternative to centralized authentication models. This survey presents a structured taxonomy of authentication frameworks based on authentication strategy, learning paradigm, and data modality, and systematically analyze existing FL-based risk-based authentication approaches. Furthermore, the survey highlights the importance of modeling authentication behavior as temporal and relational data and discuss how federated temporal graph learning can enable expressive yet privacy-aware authentication. Finally, this paper reviews commonly used datasets and evaluation practices and identify key open challenges and future research directions. This survey aims to serve as a reference and roadmap for researchers and practitioners designing next-generation adaptive and privacy-preserving authentication systems.

Downloads: 0

Download data is not yet available.

Author Biographies

Trung Kien Pham, Ho Chi Minh City University of Technology and Engineering, Vietnam

Trung Kien Pham is currently pursuing the Master’s degree in Computer Science. He received the Bachelor’s degree in Information Technology.

Email: 2591310@student.hcmute.edu.vn. ORCID:  https://orcid.org/0009-0003-2811-4659.

Tan Kien Le, Ho Chi Minh City University of Technology and Engineering, Vietnam

Tan Kien Le is currently pursuing the Master’s degree in Computer Science. He received the Bachelor’s degree in Embedded System and IoT Engineering. His research interests include intelligent transportation systems.

Email: 2591309@student.hcmute.edu.vn. ORCID:  https://orcid.org/0009-0006-8256-525X.

Vinh Thinh Le, Ho Chi Minh City University of Technology and Engineering, Vietnam

Vinh Thinh Le completed a Ph.D. at the Conservatoire National des Arts et Métiers (CNAM), Paris, France, in 2017. He is currently working at the Faculty of Information Technology, Ho Chi Minh City University of Technology and Engineering, Vietnam. He has been the author and co-author of over 20 peer-reviewed scientific articles. He has been actively involved in various research projects and collaborations both nationally and internationally. He is a dedicated educator, committed to fostering a conducive learning environment and advancing the field through research and innovation. His research interests include Trust and Reputation Systems, Security, Mobile Cloud Computing, and the Internet of Things (IoT).

Email: thinhlv@hcmute.edu.vn. ORCID:  https://orcid.org/0000-0001-5951-096X.

References

J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes,” in 2012 IEEE Symposium on Security and Privacy, May 2012, pp. 553–567. doi: 10.1109/SP.2012.44. DOI: https://doi.org/10.1109/SP.2012.44

S. Rose, O. Borchert, S. Mitchell, and S. Connelly, “Zero Trust Architecture,” National Institute of Standards and Technology, Aug. 2020. doi: 10.6028/NIST.SP.800-207. DOI: https://doi.org/10.6028/NIST.SP.800-207-draft2

H. Ramcharan, “The Effective Integration of Multi-Factor Authentication (MFA) with Zero Trust Security,” Open Access Am. J. Math. Comput. Model., vol. 10, no. 1, pp. 1–5, 2025, doi: 10.11648/j.ajmcm.20251001.11. DOI: https://doi.org/10.11648/j.ajmcm.20251001.11

H. B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, “Communication-Efficient Learning of Deep Networks from Decentralized Data,” Jan. 26, 2023, arXiv: arXiv:1602.05629, doi: 10.48550/arXiv.1602.05629.

M. Syahreen, N. Hafizah, N. Maarop, and M. Maslinan, “A Systematic Review on Multi-Factor Authentication Framework,” Int. J. Adv. Comput. Sci. Appl., vol. 15, no. 5, 2024, doi: 10.14569/IJACSA.2024.01505105. DOI: https://doi.org/10.14569/IJACSA.2024.01505105

S. P. Pote and G. C. Shinde, "A Survey on Adaptive Multi-factor Authentication using Machine Learning," International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), vol. 2, no. 9, pp. 118-121, May 2022, doi: 10.48175/IJARSCT-3977.

A. K. Wee, E. G. Chekole, and J. Zhou, “Excavating Vulnerabilities Lurking in Multi-Factor Authentication Protocols: A Systematic Security Analysis,” ACM Comput. Surv., vol. 57, no. 11, pp. 1–37, Nov. 2025, doi: 10.1145/3734864. DOI: https://doi.org/10.1145/3734864

S. Wiefling, L. L. Iacono, and M. Dürmuth, “Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild,” vol. 562, 2019, pp. 134–148, doi: 10.1007/978-3-030-22312-0_10. DOI: https://doi.org/10.1007/978-3-030-22312-0_10

T. Suleski, M. Ahmed, W. Yang, and E. Wang, “A review of multi-factor authentication in the Internet of Healthcare Things,” Digit. Health, vol. 9, p. 20552076231177144, Jan. 2023, doi: 10.1177/20552076231177144. DOI: https://doi.org/10.1177/20552076231177144

H. Fereidouni, A. S. Hafid, D. Makrakis, and Y. Baseri, “F-RBA: A Federated Learning-based Framework for Risk-based Authentication,” Dec. 16, 2024, arXiv: arXiv:2412.12324, doi: 10.48550/arXiv.2412.12324.

Y. Baseri, A. S. Hafid, D. Makrakis, and H. Fereidouni, “Privacy-Preserving Federated Learning Framework for Risk-Based Adaptive Authentication,” Sep. 19, 2025, arXiv: arXiv:2508.18453, doi: 10.48550/arXiv.2508.18453.

N. Tran, P. Ta, H. Nguyen, H. D. Nguyen, and A.-C. Le, “Hybrid contextual and sentiment-based machine learning model for identifying depression risk in social media,” Expert Syst. Appl., vol. 291, Art. no. 128505, 2025, doi: 10.1016/j.eswa.2025.128505. DOI: https://doi.org/10.1016/j.eswa.2025.128505

H. D. Nguyen and C. Sakama, “Feature Learning by Least Generalization,” in Inductive Logic Programming, Lecture Notes in Computer Science, pp. 193–202, Feb. 2022, doi: 10.1007/978-3-030-97454-1_14. DOI: https://doi.org/10.1007/978-3-030-97454-1_14

L. V. Thinh, " Journal of Science and Technology on Information Security, vol. 24, no. 1, 2025. Federated Trust-Based Authentication for Secure Mobile Cloud Access," doi: 10.54654/isj.v1i24.1113 DOI: https://doi.org/10.54654/isj.v1i24.1113

A. Badhib, S. Alshehri, and A. Cherif, “IoT Authentication in Federated Learning: Methods, Challenges, and Future Directions,” Sensors, vol. 25, no. 24, Art. no. 7619, 2025, doi: 10.3390/s25247619. DOI: https://doi.org/10.3390/s25247619

L. A. Meyer, S. Romero, G. Bertoli, T. Burt, A. Weinert, and J. L. Ferres, “How effective is multifactor authentication at deterring cyberattacks?” May 01, 2023, arXiv: arXiv:2305.00945, doi: 10.48550/arXiv.2305.00945.

B. D. Deebak and S. O. Hwang, “Federated Learning-Based Lightweight Two-Factor Authentication Framework with Privacy Preservation for Mobile Sink in the Social IoMT,” Electronics, vol. 12, no. 5, Art. no. 1250, 2023, doi: 10.3390/electronics12051250. DOI: https://doi.org/10.3390/electronics12051250

R. Aziz et al., “Exploring Homomorphic Encryption and Differential Privacy Techniques towards Secure Federated Learning Paradigm,” Future Internet, vol. 15, no. 9, Sep. 2023, doi: 10.3390/fi15090310. DOI: https://doi.org/10.3390/fi15090310

R. Veiga, C. B. Both, I. Medeiros, D. Rosário, and E. Cerqueira, “A Federated Learning Approach for Authentication and User Identification Based on Behavioral Biometrics,” in Proc. 41st Brazilian Symp. Comput. Netw. Distrib. Syst. (SBRC), 2023, pp. 15–28, doi: 10.5753/sbrc.2023.536. DOI: https://doi.org/10.5753/sbrc.2023.536

X. Li, Y. Li, H. Wan, and C. Wang, “Enhancing Byzantine robustness of federated learning via tripartite adaptive authentication,” Journal of Big Data, vol. 12, Art. no. 121, 2025, doi: 10.1186/s40537-025-01165-y. DOI: https://doi.org/10.1186/s40537-025-01165-y

M. I. Kamba and A. Dauda, “The Role of Multi-Factor Authentication (MFA) in Preventing Cyber Attacks,” Int. J. Res. Publ. Rev., vol. 6, no. 7, pp. 445–448, Jul. 2025.

T. Le Vinh, H. Thien Tran, H. Trang Phan, and S. Bouzefrane, “Federated Learning-Based Trust Evaluation With Fuzzy Logic for Privacy and Robustness in Fog Computing,” IEEE Access, vol. 13, pp. 137952–137972, 2025, doi: 10.1109/ACCESS.2025.3596093.

Y. Zhang, D. Zeng, J. Luo, Z. Xu, and I. King, “A survey of trustworthy federated learning with perspectives on security, robustness, and privacy,” arXiv preprint arXiv:2302.10637, 2023, doi: 10.48550/arXiv.2302.10637. DOI: https://doi.org/10.1145/3543873.3587681

H. U. Manzoor, A. Shabbir, A. Chen, D. Flynn, and A. Zoha, “A Survey of Security Strategies in Federated Learning: Defending Models, Data, and Privacy,” Future Internet, vol. 16, no. 10, 374, 2024, doi: 10.3390/fi16100374. DOI: https://doi.org/10.3390/fi16100374

E. Rossi, B. Chamberlain, F. Frasca, D. Eynard, F. Monti, and M. Bronstein, “Temporal Graph Networks for Deep Learning on Dynamic Graphs,” Oct. 09, 2020, arXiv: arXiv:2006.10637, doi: 10.48550/arXiv.2006.10637.

Y. Liu, X. Wang, and J. Zhang, “LAFED: A Lightweight Authentication Mechanism for Blockchain-Enabled Federated Learning System,” Future Generation Computer Systems, vol. 139, pp. 346–357, Jan. 2023, doi: 10.1016/j.future.2023.01.015. DOI: https://doi.org/10.1016/j.future.2023.01.015

T. Ashraf, M. M. Peerzada, M. Abdar, Y. Xie, Y. Zhou, X. Liu, I. A. Gillani, and J. Bashir, “ATR-Bench: A Federated Learning Benchmark for Adaptation, Trust, and Reasoning,” arXiv:2505.16850, 2025, doi: 10.48550/arXiv.2505.16850.

A. D. Kent, “Comprehensive, Multi-Source Cybersecurity Events.” 2015, doi: 10.17021/1179829.

J. Ji, S. Qiu, S. Ye, and X. Liu, “A Hybrid Federated–Incremental Learning Framework for Continuous Authentication in Zero-Trust Networks,” Future Internet, vol. 18, no. 3, Art. no. 154, 2026, doi: 10.3390/fi18030154. DOI: https://doi.org/10.3390/fi18030154

T. L. Vinh, H. T. Tran, H. T. Phan, and S. Le, “Federated learning-based trust evaluation with fuzzy logic for privacy and robustness in fog computing,” IEEE Access, vol. 13, pp. 137952–137972, 2025, doi: 10.1109/ACCESS.2025.3596093. DOI: https://doi.org/10.1109/ACCESS.2025.3596093

X. Ma, F. Fang, and X. Wang, “Dynamic authentication and granularized authorization with a cross-domain zero trust architecture for federated learning in large-scale IoT networks,” arXiv preprint arXiv:2501.03601 [cs.NI], 2025, doi: 10.48550/arXiv.2501.03601. DOI: https://doi.org/10.1109/TNSE.2025.3650377

Downloads

Published

08-05-2026

How to Cite

[1]
T. K. Pham, T. K. Le, and V. T. Le, “Adaptive Multi-Factor Authentication With Federated and Temporal Learning: A Survey: Online First: 08/05/2026”, JTE, May 2026.