CFP last date
20 June 2024
Reseach Article

Multifactor Authentication using Android Mobile

Published on February 2016 by Komal Kamble, Mamta Mishra, Trupti Shirdhankar, Rina Bora
International Conference on Advances in Science and Technology
Foundation of Computer Science USA
ICAST2015 - Number 1
February 2016
Authors: Komal Kamble, Mamta Mishra, Trupti Shirdhankar, Rina Bora
a612608b-c731-4333-8ed3-1e9742df11ca

Komal Kamble, Mamta Mishra, Trupti Shirdhankar, Rina Bora . Multifactor Authentication using Android Mobile. International Conference on Advances in Science and Technology. ICAST2015, 1 (February 2016), 20-23.

@article{
author = { Komal Kamble, Mamta Mishra, Trupti Shirdhankar, Rina Bora },
title = { Multifactor Authentication using Android Mobile },
journal = { International Conference on Advances in Science and Technology },
issue_date = { February 2016 },
volume = { ICAST2015 },
number = { 1 },
month = { February },
year = { 2016 },
issn = 0975-8887,
pages = { 20-23 },
numpages = 4,
url = { /proceedings/icast2015/number1/24220-3005/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Science and Technology
%A Komal Kamble
%A Mamta Mishra
%A Trupti Shirdhankar
%A Rina Bora
%T Multifactor Authentication using Android Mobile
%J International Conference on Advances in Science and Technology
%@ 0975-8887
%V ICAST2015
%N 1
%P 20-23
%D 2016
%I International Journal of Computer Applications
Abstract

Many web accounts are getting hacked everyday even though the public web servers like Gmail, Yahoo and Hotmail utilizes the well-known security techniques. However, attacks usually happen due to personal faults such as users do use a password or PIN that can be easily determined or bypassed, such as 1234 or 0000, birth date, name, mobile number. Traditional authentication system involves the use of a secret key or password of which user must memorize and recall during authentication, however due to user's careless, password can be forgotten or read by someone or simply intercepted during communication. Many approaches have been proposed for proper strategies of securing and using passwords. However, this can only reduce the problem of a static password authentication to some certain degree as it still has a lot of shortcomings. So we are proposing Multi-factor authentication to be an improved authentication scheme to overcome personal faults. It increases security by generating a secret hash code using a pre-shared number and user's current GPS location.

References
  1. Perrig, Adrina. "Shortcomings of Password-Based Authentication" (2000).
  2. Lamport, Leslie. "Password authentication with insecure communication"Communications of the ACM 24. 11 (1981).
  3. Ross, Blake, et al. "Stronger password authentication using browser extensions" Proceedings of the 14th Usenix Security Symposium. Vol. 1998. 2005.
  4. Nystrom, M. "The SecurID (r) SASL Mechanism", 2000.
  5. Bauckman, Dena Terry, Nigel Paul Johnson, and David Joseph Robertson. "Multi-Factor Authentication" U. S.
  6. Dispensa, Steven. "Multi factor authentication" U. S. Patent Application 11/862,173.
  7. Weber, Frank. "Multi-factor authentication" U. S. Patent No. 7,770,002. 3 Aug. 2010.
  8. Bhargav Spantzel, Abhilasha, et al. "Privacy preserving multifactor authentication with biometrics. " Journal of Computer Security 15. 5 (2007).
  9. Sabzevar, Alireza Pirayesh, and Angelos Stavrou. "Universal multi-factor authentication using graphical passwords. " Signal Image Technology and Internet Based Systems, 2008. SITIS'08. IEEE International Conference on. IEEE, 2008.
  10. Aloul, Fadi, Syed Zahidi, and Wassim El-Hajj. "Two factor authentication using mobile phones. " Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS International Conference on. IEEE, 2009
Index Terms

Computer Science
Information Sciences

Keywords

Gps Hashing Algorithm Multi-factor Authentication Web Security.