![]() |
10.5120/ijca2016912427 |
Tirupati Bala and Surinder Singh. Implementation of Security System using Multifactor Authentication. International Journal of Computer Applications 156(5):6-8, December 2016. BibTeX
@article{10.5120/ijca2016912427, author = {Tirupati Bala and Surinder Singh}, title = {Implementation of Security System using Multifactor Authentication}, journal = {International Journal of Computer Applications}, issue_date = {December 2016}, volume = {156}, number = {5}, month = {Dec}, year = {2016}, issn = {0975-8887}, pages = {6-8}, numpages = {3}, url = {http://www.ijcaonline.org/archives/volume156/number5/26703-2016912427}, doi = {10.5120/ijca2016912427}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
As we know one factor authentication does not provide required security to a user while accessing the areas like banking, insurance, medical records etc. Users have to simply type a user name and password on the website So there is a need to increase the level of security for these users. This paper introduces an approach to increase the security level by using multifactor authentication scheme. This approach requires the user to login with a username and password. As the user enters his password, he will get the OTP generated by the system on his cell phone. We are integrating this approach with image based authentication and question based authentication. To develop this system we are using SHA algorithm and Lamport’s algorithm. By using these algorithms we can develop more secured multifactor authentication. We are using visual studio as the front end and My SQL as the back end. The results show a more secured system.
References
- R. Dhamija and A. Perrig, 2000 "Déjà Vu: a user study using images for authentication," USENIX Association Berkeley, CA, USA, pp. 4-4.
- S. Akula and V. Devisetty, 2004 "Image Based Registration and Authentication System," in Proceedings of Midwest Instruction and Computing Symposium.
- D.de Borde,“Two-Factor Authentication, 2008” Siemens Enterprise Communications UK-Security Solutions, whitepaper.
- Dr.D.S.Rao, Gurleen Kour, 2011 "One Time Password Security through Cryptography For Mobile Banking", IJCTA, Vol 2 (5).
- Humaira Dar, WajdiFawzi Mohammed Al-KhateebAnd Mohamed HadiHabaebi, 2013. Secure Scheme For User Authentication And Authorization In Android Environment. Int. Journal of Engineering Research and Applications. Vol. 3, Issue 5, pp.1874-1882.
- Sagar Acharya, A. P, 2013. Two Factor Authentication Using Smartphone Generated One Time Password. IOSR Journal of Computer Engineering (IOSR-JCE), 85-90.
- Ankit Aggarwal, Darshil Doshi, Vijay Gore and JigneshSisodia, 2015. Three Level Security Using Cued Click Points in Image Based Authentication.International Journal of Innovative and Emerging Research in Engineeringe-ISSN: 2394 – 3343 p-ISSN: 2394 – 5494.
- Niharika Gupta and Rama Rani, 2015. Implementing High Grade Security in Cloud Application using Multifactor Authentication and Cryptography. International Journal of Web & Semantic Technology (IJWesT) Vol.6, No.2.
Keywords
Multifactor Authenticaction; Security; OTP (One Time Password); Graphical Password; Knowledge based Authentication