Intensify Login Security by Using Extra Authentication level with OTP

Authors

  • Gagan Madaan  Assistant Professor, Department of Computer Science & Applications, S.U.S. Panjab University Constituent College Guru Harsahai, Punjab, India

Keywords:

Authentication, Security, One-Time Password;

Abstract

In Online based applications most of them used static passwords. In that they follow multiple technics to secure their credentials. For examples: Multi level password authentications, hard codes, Session Passwords, bio- matric technics, and One Time Password. Every method has some advantages and disadvantages. Our proposed idea is to enhance the security level of One Time Password by Using Extra Authentication level with the OTP also called Two-factor authentication. It increases the security level of the system.

References

  1. http://searchsecurity.techtarget.com/definition/multifactor-authentication-MFA.
  2. McAfee Case Study "Securing the Cloud with Strong Two-Factor Authentication through McAfee One Time Password" http://www.mcafee.com/in/casestudies/cs-cloudalize.aspx.
  3. http://www.oneid.com/wpcontent/uploads/2014/05/OneID_WhitePaper_Adv-of-Integrated-2FA-final.pdf.
  4. Edward F. Gehringer "Choosing passwords: Security and Human factors" IEEE 2002 international symposium on Technology and Society, (ISTAS’02),\ ISBN 0-7803-7284-0, pp. 369 - 373, 2002.
  5. Sagar Acharya, Apoorva Polawar, Priyashree Baldawa, Sourabh Junghare, P.Y. Pawar " Internet Banking Two Factor Authentication Using Smartphone" , IJSER, IJSER, Volume 4, Issue 3, March Edition, 2013, (ISSN 2229-5518)
  6. Aladdin Secure SafeWord 2008. Available at http://www.securecomputing.com/index.cfm?skey=1713
  7. Asif Amin, Israr ul Haq2, Monisa Nazir3, "Two Factor Authentication" International Journal of Computer Science and Mobile Computing, july 2017
  8. Ms. E.Kalaikavitha,Mrs. Juliana gnanaselvi "Secure Login Using Encrypted One Time Password (Otp) and Mobile Based Login Methodolo " International Journal Of Engineering And Science ,Apr 2013
  9. The mobile phone as multi otp device using trusted computing http://eprints.qut.edu.au/37711/
  10. H. Wang, "Research and Design on Identity Authentication System in Mobile-Commerce", In: Beijing Jiaotong University, 2007, pp. 18-50.
  11. Ziqing Mao, Dinei Florencio, and Cormac Herley "Painless Migration from Passwords to Two Factor Authentication" in 'WIFS' , IEEE, Brazil, pp. 1-6, Nov 29th-Dec 2nd, 2011.
  12. Manav Singhal and Shashikala Tapaswi "Software Tokens Based Two Factor Authentication Scheme" International Journal of Information and Electronics Engineering, Vol. 2, No. 3, pp. 383 - 386, May 2012.
  13. Olufemi Sunday Adeoye "Evaluating the Performance of two-factor authentication solution in the Banking Sector" IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 2, July 2012.
  14. Goode intelligence "Two Factor Authentication Goes Mobile" www.goodeintelligence.com, September 2012.

Downloads

Published

2017-10-30

Issue

Section

Research Articles

How to Cite

[1]
Gagan Madaan, " Intensify Login Security by Using Extra Authentication level with OTP , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.1087-1092, September-October-2017.