Increase Use of Multifactor Authentication

Authors

  • Deep Patel
  • Dipesh Sharda
  • Dhaval Chudasama

Keywords:

Multifactor authentication, security, OTP (one time password), graphical password; knowledge-based authentication

Abstract

AS we all know a single verification is not capable of providing enough security to a user’s while accessing the area like insurance, medical record, banking etc. In this user just type their id and password to login into the website but users want website to increase the security. By using multifactor authentication scheme, we can increase the security level we are going to know in this paper. In this method user requires to login with ID and password. As soon as user enter his/her ID and password system will generate one OTP (One Time Password) which will be send on registered mobile number of the user. We can also use image-based conformation and question-based conformation. We are going to use SHA algorithm and Lamport’s algorithm to develop this system. With the help of these algorithms more secure multifactor authentication can be created. At the front end we use visual studio and at the back end we use MY SQL. At the end we get see more secured system.

References

Desai Vinanti V, Patel Aeny M, Solanky Jigna. Technical review of different methods for multi factor authentication. Int Res J Eng Technol (IRJET). 2019;6(5):7007-13.

Neware R, Shrawankar U, Mangulkar P, Khune S. Review on multi-factor authentication (MFA) sources and operation challenges. Int J Smart Sec Technol. 2020;7(2):62-76. doi: 10.4018/IJSST.2020070104.

Veracross. Increase security and peace of mind with multi-factor authentication [online]. Available from: https://www.veracross.com/customer-stories/increase-security-and-peace-of-mind-with-multi-factor-authentication/.

PTG. How to improve your security with multi-factor authentication [online]. Available from: https://blog.goptg.com/how-to-improve-your-security-with-multi-factor-authentication.

Bala Tirupati, Singh Surinder. Implementation of security system using multifactor authentication. Int J Comput Appl. 2016;156(5):6-8. doi: 10.5120/ijca2016912427.

PingIdentity. Multi-factor authentication (MFA) [online]. Available from: https://www.pingidentity.com/en/platform/multi-factor-authentication.html.

Huseynov Emin, Seigneur Jean-Marc. Chapter 50. Context-aware multifactor authentication survey. Computer and information security handbook. 3rd ed; 2017. p. 715-26.

Nwabueze Ekwonwune Emmanuel, Obioha Iwuoha, Onuoha O. Enhancing multi-factor authentication in modern computing. Commun Network. 2017;09(3):172-8. doi: 10.4236/cn.2017.93012.

Ometov Aleksandr Aleksandr, Bezzateev Sergey, Mäkitalo N, Andreev S, Mikkonen T, Koucheryavy Y. Multi-factor authentication: A survey. Cryptography. 2018;2(1). doi: 10.3390/cryptography2010001.

Microsoft. Plan an Azure Active Directory Multi-Factor Authentication deployment [online] (Last access; 11/30/2021). Available from: https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-getstarted.

Dand Pashwa, Chudasama Dhaval. Vulnerability. Int J Wirel Network Sec. 2021;7(1):1-6p.

Chudasama D, Patel D, Shah A, Shaikh N. Research on cybercrime and its policing. Am J Comput Sci Eng Surv. 2020;8(3: 14).

Published

2022-01-18

How to Cite

Patel, D. ., Sharda, D. ., & Dhaval Chudasama. (2022). Increase Use of Multifactor Authentication. JOURNAL OF OPERATING SYSTEMS DEVELOPMENT &Amp; TRENDS, 8(2), 26–31. Retrieved from https://stmcomputers.stmjournals.com/index.php/JoOSDT/article/view/118