A Comparative Analysis of Various Multifactor Authentication Mechanisms

Authors(2) :-B. Kharthik Kumar Reddy , Dr. B. Indira Reddy

Due to advancements and improvements in internet and communication systems, more people are relying on internet to store their confidential information. Earlier the idea of static passwords was being used but most of the passwords are weak and easily guessable. According to a survey ninety percentage of passwords that are used by people are poor very poor or keywords of their personal information, which makes easy for attackers and intruders to guess passwords in different combinations using brute-force attack. Thus the idea of multi-factor authentication introduced in the world instead of this remote client authentication mechanism. It hardens the security of network and make difficult for the attackers to crack the system. In these mechanisms, user needs to provide extra information along with username and passwords. Most popular is one-time passwords that are generated randomly and valid only short period (30 to 60 seconds). In this paper, review of various multi-factor authentication schemes has been performed to compare various authentication mechanisms.

Authors and Affiliations

B. Kharthik Kumar Reddy
M-Tech, IT, Sreenidhi Institute of Science and Technology, Hyderabad, Telangana, India
Dr. B. Indira Reddy
Professor, IT, Sreenidhi Institute of Science and Technology, Hyderabad, Telangana, India

Multi-factor authentication, One time passwords, Static passwords, Short message service, Time base done time passwords (TOTP) and Image based and Finger print authentication.

  1. Uymatiao, Mariano Luis T., and William Emmanuel S. Yu. “Time-based OTP Authentication via Secure Tunnel(TOAST): A mobile TOTP scheme using TLS seed exchange and encrypted offline keystroke.” 4thIEEE International Conference on Information Science and Technology(ICIST), 2014,Pp. 225-229,IEEE,2014.
  2. Muliner, C., Borgaonkar, R., Stewin, P.,Seifert, J., “SMS-based One-Time Passwords: Attacks and Defense”, volume 7967,Pp. 150-159 Springer-Verlag Berlin Heidelberg 2013.
  3. Appelman, M., Scheelen, Y., “Analysis of Google’s 2step Authentication”,University of Amsterdam, May 2012, www.scribd.com/doc/95267199/Analysis-ofGoogle-s-2-StepVerification#scribd
  4. Subashini, K., and Sumithra, G., “Secure multimodal mobile authentication using one time password.” 2nd International Conference on Current Trends in Engineering and Technology (ICCTET), 2014, pp. 151155. IEEE, 2014.
  5. Munjal N., Moona R., “Secure and Cost effective Transaction Model for Financial Services”, International Conference on Ultra Modern Telecommunications and Workshops, 2009, Pp. 1-6, IEEE, ICUMT’09.
  6. Phillip H. Griffin[2015] Biometric Knowledge Extraction for Multi-Factor Authentication and Key Exchange.
  7. Studying on Internet of Things based on Fingerprint Identification,Huang hongbo, Wang Huan[2010] Zhongkai University of agriculture and engineering Guangzhou.
  8. Steven M.Bellovin [2013]Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks.
  9. Robust Multi-Factor Authentication for Fragile Communications Xinyi Huang, Yang Xiang Senior Member, IEEE, Elisa Bertino, Jianying Zhou, and Li Xu Member, IEEE[2013]
  10. Trustworthy Sensing for Public Safety in Cloud-Centric Internet of Things Burak Kantarci, Senior Member, IEEE, and Hussein T. Mouftah, Fellow, IEEE[2014].
  11. Towards secure cloud-centric Internet of Biometric Things Burak Kantarci, Senior Member, IEEE, Melike Erol-Kantarci Senior Member, IEEE, Stephanie Schuckers Senior Member, IEEE[2015]
  12. Authentication and Access Control in the Internet of Things Jing Liu and Yang Xiao, C. L. Philip
  13. Multi Factor Authentication Using Mobile Phones by Fadi Aloul1, Syed Zahidi1, Wasim El- Hajj2[2009]
  14. A MULTI-FACTOR SECURITY PROTOCOL FOR WIRELESS PAYMENT- SECURE WEB AUTHENTICATION USING MOBILE DEVICES Ayu Tiwari, Sudip Sanyal ,Ajith Abraham, Sugata Sanyal[2014].
  15. Biometric-Rich Gestures: A Novel Approach to Authentication on Multi-touch Devices,NapaSaeBae,KowsarAhmed,KatherineIsbisterandNasirMemon[2012].
  16. Identity-Based Authentication Scheme for the Internet of Things Ola Salman Sarah Abdallah Imad H. Elhajj Ali Chehab Ayman Kayssi[2016].
  17. Remote Password Authentication Scheme with Smart Cards and Biometrics byChun-I Fan*, Yi-Hui Lin, and Ruei-Hau Hsu [2015]
  18. Robust Multi-Factor Authentication for Fragile Communications Xinyi Huang, Yang Xiang Senior Member, IEEE, Elisa Bertino, Jianying Zhou, and Li Xu Member, IEEE[2012].

Publication Details

Published in : Volume 3 | Issue 5 | May-June 2018
Date of Publication : 2018-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1098-1103
Manuscript Number : CSEIT1835260
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

B. Kharthik Kumar Reddy , Dr. B. Indira Reddy, "A Comparative Analysis of Various Multifactor Authentication Mechanisms", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.1098-1103, May-June-2018.
Journal URL : http://ijsrcseit.com/CSEIT1835260

Follow Us

Contact Us