Multifactor Authentication Techniques with Computer Hardware

Authors(2) :-Vijeet H. Meshram, Dr. Ashish B. Sasankar

For quite a long time, the password has been the standard means for user authentication on computers. In any case, as clients are required to recollect more, longer, and evolving passwords, it is apparent that a more helpful and secure answer for client verification is vital. This paper analyzes different authenticators and thinks about these authenticators and their blends. We examine effectiveness against several attacks and suitability for particular security specifications such as compromise detection and non-repudiation. The paper attempts to offer a more blended multifactor authentication technique by introducing computer hardware in the process.

Authors and Affiliations

Vijeet H. Meshram
Research Scholar, Department of Electronics and Computer Science,RTMNU, Nagpur University, Nagpur, Maharashtra, India
Dr. Ashish B. Sasankar
G. H. Raisoni College of Information Technology,Nagpur Hingna, Nagpur , Maharashtra, India

Multifactor Authentication, Security tokens, Soft tokens, Mobile Authentication

  1. https://en.wikipedia.org/wiki/Multi-factor_authentication
  2. R. P. R, Corporate computer and network security. New Jersey United States of America: Pearson Education, Inc, 2004
  3. C. Wang and H. Leung, “A private and efficient mobile payment protocol,” Computational Intelligence and Security.
  4.  J. Tellez and J. Sierra, “Anonymous payment in a client centric model for digital ecosystem,” IEEE DEST, pp. 422–427, 2007.
  5. M. Rajalingam, S. Alomari, and P. Sumari, “Prevention of phishing attacks based on discriminative key point features of webpages,” International Journal of Computer Science and Security (IJCSS), vol. 6, no. 1, p. 527, 2012.
  6. K. Patowary. (2009) How to interpret hard disk model numbers. [Online]. Available: http://www.instantfundas. com/2009/02/how-to-interpret-hard-disk-model.html
  7. S. Malik, Network Security Principles and Practices. 800 East 96th Street Indianapolis, USA: Cisco Press logo of Cisco System, Inc, 2003.
  8. C. Mongoho, “Mac based wireless authentication with ias,” Techre public. [Online]. Available: http: //techrepublic.com.com/5208-7343-0.html?forumID= 102&threadID=226120&start=0&tag=content;leftColm, Bibliography 206
  9. J. Pang, B. Greenstein, R. Gummadi, S. Srinivasan, and D. Wetherall, “802. 11 user fingerprinting,” in International Conference on Mobile Computing and Networking: Proceedings of the 13 th annual ACM international conference on Mobile computing and networking, vol. 9, no. 14, 2007, pp. 99–110.
  10. I. Graham and W. Joseph, “Authenticating public access networking,” in Proceedings of the 30th annual ACM SIGUCCS conference on User services. ACM.
  11. O. Corre, I. Fodil, V. Ksinant, and G. Pujolle, “An architecture for access network management with policies (an-pbm),” in Management of Multimedia Networks and Services, ser. Lecture Notes in Computer Science, A. Marshall and N. Agoulmine, Eds. Springer Berlin Heidelberg, 2003, vol. 2839, pp. 328–340. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-39404-4 25
  12. D. Fye, “Evolution of wlan roaming services,” in CDG WLAN Technical Forum, Dallas, Texas, vol. 2, 2003.
  13. F. A. and B. Levy, “Network security device which performs mac address translation without affecting the ip address,” uS Patent 5,757,924.
  14. P. Hamalainen, M. Hannikainen, M. Niemi, and T. Hamalainen, “Performance evaluation of secure remote Bibliography 207 password protocol,” in Circuits and Systems, 2002 IEEE International Symposium on, vol. 3. IEEE, 2002, pp. III–29.
  15. T. Wu, “The secure remote password protocol,” in Internet Society Symposium on Network and Distributed System Security, 1998.
  16. A. Menezes, P. Van Oorschot, and S. Vanstone, Handbook of applied cryptography. CRC, 1996.
  17. A. Ahmed, “Security monitoring through human computer interaction devices,” Ph.D. dissertation, UNIVERSITY

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1746-1751
Manuscript Number : CSEIT1831424
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Vijeet H. Meshram, Dr. Ashish B. Sasankar, "Multifactor Authentication Techniques with Computer Hardware", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1746-1751, January-February-2018. |          | BibTeX | RIS | CSV

Article Preview