CFP last date
20 August 2024
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024

Submit your paper
Know more
Reseach Article

Implementation of Security System using Multifactor Authentication

by Tirupati Bala, Surinder Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 5
Year of Publication: 2016
Authors: Tirupati Bala, Surinder Singh

Tirupati Bala, Surinder Singh . Implementation of Security System using Multifactor Authentication. International Journal of Computer Applications. 156, 5 ( Dec 2016), 6-8. DOI=10.5120/ijca2016912427

@article{ 10.5120/ijca2016912427,
author = { Tirupati Bala, Surinder Singh },
title = { Implementation of Security System using Multifactor Authentication },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 5 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-8 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016912427 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T00:01:45.817469+05:30
%A Tirupati Bala
%A Surinder Singh
%T Implementation of Security System using Multifactor Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 5
%P 6-8
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

As we know one factor authentication does not provide required security to a user while accessing the areas like banking, insurance, medical records etc. Users have to simply type a user name and password on the website So there is a need to increase the level of security for these users. This paper introduces an approach to increase the security level by using multifactor authentication scheme. This approach requires the user to login with a username and password. As the user enters his password, he will get the OTP generated by the system on his cell phone. We are integrating this approach with image based authentication and question based authentication. To develop this system we are using SHA algorithm and Lamport’s algorithm. By using these algorithms we can develop more secured multifactor authentication. We are using visual studio as the front end and My SQL as the back end. The results show a more secured system.

  1. R. Dhamija and A. Perrig, 2000 "Déjà Vu: a user study using images for authentication," USENIX Association Berkeley, CA, USA, pp. 4-4.
  2. S. Akula and V. Devisetty, 2004 "Image Based Registration and Authentication System," in Proceedings of Midwest Instruction and Computing Symposium.
  3. Borde,“Two-Factor Authentication, 2008” Siemens Enterprise Communications UK-Security Solutions, whitepaper.
  4. Dr.D.S.Rao, Gurleen Kour, 2011 "One Time Password Security through Cryptography For Mobile Banking", IJCTA, Vol 2 (5).
  5. Humaira Dar, WajdiFawzi Mohammed Al-KhateebAnd Mohamed HadiHabaebi, 2013. Secure Scheme For User Authentication And Authorization In Android Environment. Int. Journal of Engineering Research and Applications. Vol. 3, Issue 5, pp.1874-1882.
  6. Sagar Acharya, A. P, 2013. Two Factor Authentication Using Smartphone Generated One Time Password. IOSR Journal of Computer Engineering (IOSR-JCE), 85-90.
  7. Ankit Aggarwal, Darshil Doshi, Vijay Gore and JigneshSisodia, 2015. Three Level Security Using Cued Click Points in Image Based Authentication.International Journal of Innovative and Emerging Research in Engineeringe-ISSN: 2394 – 3343 p-ISSN: 2394 – 5494.
  8. Niharika Gupta and Rama Rani, 2015. Implementing High Grade Security in Cloud Application using Multifactor Authentication and Cryptography. International Journal of Web & Semantic Technology (IJWesT) Vol.6, No.2.
Index Terms

Computer Science
Information Sciences


Multifactor Authenticaction Security OTP (One Time Password) Graphical Password Knowledge based Authentication