SlideShare a Scribd company logo
1 of 10
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7007
TechnicalReviewofDifferentMethodsforMultiFactor Authentication
Desai Vinanti V1, Patel Aeny M2, Ms. Jigna Solanky3
1Desai Vinanti V
2Patel Aeny M
3Ms. Jigna Solanky, Dept. of computer science, Babu Madhav Institute of Information and Technology, Gujarat, India.
------------------------------------------------------------------------***-------------------------------------------------------------------------
Abstract - In this paper, we present different methods to authenticate a user. User authentication usually refers to user
identification based on something user has, somethinguserisandsomethinguserdoes.Multi FactorAuthentication[MFA]isa
security system that requirement more than two user credential to identify user for any transactional process. MFA is
expected to be utilized for human-to- everything interactions by enabling fast and reliable authentication when accessing
service. Multi-Factor Authentication (MFA) was proposed to provide a higher level of safety and facilitate continuous
protection of computing devices as well as other critical services from unauthorized access by using more than two
categories ofcredentials.
Keywords – MFA, hand veins, GPS, biometric authentication, passwords, smart card, touch screen authentication.
1. Introduction
Today security concerns are on the rise in all areas such as banks, governmental applications, healthcare industry,
military organization, educational institutions, etc. Many different types of online services have become available with the
development of the internet. Authentication is a process where a “user identifies himself by sending value to the system; the
system authenticates his identity by computing and checking that it equals the stored value. MFA verified via the first
authentication factor (usually password) along with a second or even a third factor such as smartcards, fingerprints, or
user’s mouse movements.
Authentication can prevent device and services from authorized access by validating user identity. MFA is an approach for
authentication which requires the use of two or more of the universally recognized authentication factors: a knowledge-
factor, a possession factor and a biometric factor.
1. Knowledge factor:
- Something the user knows, ex: password
2. Possession factor:
- Something the user has, ex: smart card
3. Biometric factor:
- Something the useris
2. MFA Methods
2.1 Smartcardbasedapproach
Nowadays smart card based password authentication has become one of the common authentication mechanism. In
this
[1] has used smart based authentication protocol. This protocol includes following phases:
1. Initialization:
Algorithm for MFA is denoted by (k) -> (PK , SK)
Where, k = security parameter, PK = Public key, SK = Secret key.
2. Registration:
Inthisphasetheuserdataandpassword willgetregisteredtothesystemwiththe use of thisprotocol.
3. Login-Authentication:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7008
ThisphaseenabletheuserUtogetlogin tothesystemsuccessfullywiththeuseof PW, SC andbio-data.
4. Password changing:
This phase will allow the user to change his/her password after a successful authentication. After changing the
data, it will automatically updated in the smart card.
5. Bio-metric Changing:
Just like the previous, User can also changetheirbio-metricsthatusedinthe system.
Ex: Using the different finger user can change their bio-metrics.
2.2 UseofGraphicalpassword
Author of this paper, [2] has used graphical password for user authentication. Graphical password is an alternative to
alphanumeric passwords in which users click on images to authenticate themselves rather than typing alphanumeric words.
This technique is classified into two categories:
1. Recognition Based:
In this category, users will select images, icons or symbols from a collection of images. At the time of authentication, the
usersneed to recognize their images, symbols or icons whichareselectedatthetimeofregistration among a set ofimages.
2. Re-call Based:
In this category, users have to reproduce their passwords without being given any type of hints or reminder. Although
this category is very easy and convenient, but it seems that users can hardly remember their passwords. Still it is more
secure than the recognition based technique.
Table1:Comparingthesecurityofgraphical passwordandtext-basedpasswords
Issues Text-Based
password
Graphical
Password
Dictionary
attack
.
Guessing . .
Spyware/key-
logger
. .
Shoulder
surfing
. .
2.3 MethodofRiskAssessment
In this paper, [3] author have used different authentication methods for various services. Following services use following
methods:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7009
1. Web Portal:
Log-in, Registration, ID/Password retrieval
2. E-transaction:
Login, Electronic payment
3. Financial Institution: Login, Account transfer
4. E-government:
Login, Electronic binding
2.4 Token Presence
In this proposed system [4] has used mobile phone as a software token as s OTP generation for short period of
time that are unique. The system will have two modes of operation:
1. Connection-Less Authentication System: A onetime password (OTP) is generated without connecting the
client to theserver.
2. SMS-Based Authentication System: The mobile phone sends to the server, via an SMS message, information
unique to the user. The server checks the SMS content and if correct, returns a randomly generated OTP to the
mobile phone.
The following factors were chosen:
1. IMEI number: It stands for International Mobile Equipment Identity which is unique to each mobile phone
allowingeachusertobeidentifiedbyhis device.
2. IMSI number: It stands for International Mobile Subscriber Identity which is a unique number associated
with all GSM and Universal Mobile Telecommunications System.
3. PIN: This is required to verify that no oneotherthanusercanusethephoneto generate the user’sOTP.
2.5 MFA usingPGT
The author [5] has use PGT [Preshared number, GPS Location and Time Stamp] that enhances security by
generating a secret hash code based on a pre0-shared number and user’s current GPS location.
The GPS location utilizing the device’s geographical location to validate whether access tothe device/service could
begranted isa special case of location-based authentication. GPS signal could be easily jammed or consideredfaultydue to the
propagation properties. Thus, it is recommended to utilize at least two location sources ,for example, GPS and wireless
network cell ID.
PGT Authentication Scheme
Stage 1:
Stage 2:
In this stage app is responsible for generating the security token T1 according to the following equation where TS1
isthecurrenttime stamp:
T1=hash (Pre-Shared Number + GPS + TS1);
Stage 3:
Server generates a security token T2 using equation1. Then it compares T1 with T2, if they match, the user is
authenticated and his personal web page is sent back to device.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7010
2.6 HandVeinRecognition
The authors [6] of this method, has used touch sensing system. One of the most user identification system is
DiamondTouch by Mitsubushi Electric Research Laboratory. The system use a top mounted camera to track the user’s
hand on the tactilesurface.
In this stage, the user requests his personal web page URL through any internet- enabled device. The user
provides his credentials to device which sends them to server for verification. If the user is verified, server asks for the
security token.
In this method close touches from different hands are hard to identify. This method will let user to identify by lying their
hand on the surface. Lighting should be perform under a very tight optical window in the range of 750-940 mm. It acquire
thepatternofthebackofyourhand.The belowimagedoatransformationthatextractthe vein pattern.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7011
2.7 DNA Recognition
Humancell lines arean essential source ofuniqueDNAfingerprintinginformation.Even though the process is time-
consuming and expensive, it provide highly secure facility as compare to other factors.
The factors evaluated for the comparison of suitable factors for MFA are as below:
 Universality: the presence of factor in each person.
 Uniqueness: how well the factor differentiatesonepersonfromanother.
 Collectability: how easy it is to acquire data for processing.
 Performance: the achievable accuracy, speed, and robustness.
 Acceptability: the degree of acceptance ofthetechnologybypeopleintheirdaily life.
2.8 UsingBiometricAuthentication
Authentication is one of the most important issue in computer security management and information system. In
biometric authentication such as fingerprint, handwriting,signature,orcharacteristicsofuser behaviours.
Other biometric authenticationa are retina authentication, hand-gesture authentication, human body print authentication
as well as the characteristics behaviours such as movement and keystroke authentication. This type of authentication are
moresecurethenfingerprint.
In that two methods are involved:
 Namely ,physicalbiometric:
It is uses human body parts such as fingerprint, retina, face,DNA and hand geometry.
 Behavioral biometric:
Itisusesmeasurablepatternsinhuman activities such as keystroke dynamic, voice ID and gaitanalysis.
The performance of biometric authentication can measure three factor include:
 False Acceptance Rate(FAR):It isthe measure of possibility thatthe biometric incorrectly permit an access attempt
by an unauthorizeduser.
 False Rejection Rate(FRR):It is the measure of the likehood that the biometric incorrectly denies an access
attempt by an authorizeduser.
 Equal Error Rate(EER):When FAR and FRR are equal, it is called EER.
2.9 UsingKeymangment:
In this PKI(Public Key Infrastructure)based on e-health authentication
architecture.It is stores user credentials and digital certificates in smart cards to provide a strong authentication
method.
 Client andserver:
The KMS will be responsible for authenticating and authorizing the user to use cryptographic keys to create signature
or to maintain the electronic data.it will work as a secure cryptoprocessor, maintain the correct execution.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7012
 One timepassword:
The principle of OTP is to sharea seed between a generator and a verifier where produce the same number.
 Diffie-Hellman KeyExchange:
The main porpose of sharing a secret though a public network and we used it to share the seed of the OTP protocol.
 QR code:
The QR code was invented by the Japanese corporation denso wave.the QR code makes the intraction between mobile
devices and other data formatseasier.
3. LiteratureReview
In paper [5], This paper presents a new mobile-based multi-factor authentication scheme based on a pre-shared
number, GPS location and Time stamp (PGT).A new multi- factor authentication method was presented. It utilizes the
user’s mobile device to generate an OTP which can be used as an authentication second factor. Unlike other methods of
multi- factor authentication that employ the use of special devices like a security token which adds more cost to the
authenticationsystem,PGTuses a mobile device whichisa commondeviceforall users.
It generates a security token T2using equation . Then it compares T1 with T2 , if they match, the user is
authenticated and his personal web page is sent back to D1.It increases the security risk as the shared seed can be
intercepted by an intruder. Also the OTP does not contain user specific information like the user’s current GPS location
which makes it less powerful comparedtoourproposedapproach.
In paper [4], This paper focuses on the implementation of two-factor authentication methods using mobile
phones. It provides the reader with an overview of the various parts of the system and the capabilities of the system.The
proposed system has two option of running, either using a free and fast connection-less method or a slightly more
expensive SMS based method. Both methods have been successfully implemented and tested, and secure.Such programs
implement a One Time Password (OTP) algorithm. OTP algorithms are critical to the security of systems employing them
since unauthorized users should not be able to guess the next password in thesequence.
The proposed system has two option of running, either using a free and fast connection-less method or a slightly more
expensive SMS based method.
In paper [10], Multi-factor authentication is utilized for human-to- everything interactions by enabling fast, user-
friendly, and reliable authentication when accessing a service.In MFA many method or source are available but in this
paper DNA recognition method is used and in that Human cell lines are an essential resource for research, which is most
frequently used in reverse genetic approaches.It is also a source of unique DNA fingerprinting information. Even though
the process is time-consuming and expensive, it may be potentially utilized to pre-authorize the user to the highly secure
facility along with other factors.
In paper [7],in this method system is not to implement and provide its own, proprietary authentication factors but
to enable transparent access to authentication factors provided by third parties. The basic requirement for the MFAS is
the capability to connect and use all of the above mentioned authentication mechansims. The function of the MFAS is reduced
to facilitating the authentication server in providing an online user interface. Some authentication factors perform a local
verification of credentials on the user device or an attached/connected device and expose the authentication results so
thattheycanbeusedby the MFAS.
Inpaper[8], Authentication isone of the most important issues in computer security management and information
systems. The biometric authentication that is widely used is fingerprint authentication . Fingerprint can be used to access
a personal computer, access a smart phone.
Keystroke authentication may be an alternative since it is not costly and easy to implement. In Biometric
authentication unique biological characteristics of individuals to determine identity, which consists of two methods,
namely, physical biometric and behavioral biometric.It can prevent shoulder surfing attacks. This is because users do not
need to look at their keyboard when tapping or touching a touchpad or a touch screen.
In paper[2], the user enters the password by clicking on a set of images, specific pixels of an image,or by drawing
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7013
a pattern in a pre-defined and secret order. graphical password employs graphical presentations such as icons, human
faces or custom images to create a password .Our approach can be effectively and securely used as user-friendly
authentication mechanism forpublic and un-trusted users.
In paper[1], we demonstrate how to incorporate biometrics in the existing authentication based on smart card
and password. smart-card-based password authentication has become one of the most common authentication
mechanisms. simple dictionary attacks can crack passwords in a short time.A solution to preserve user privacy
eventhe server has a copy of clients’ biometric data.the store data and the input biometric data.
In paper[6],A biometric system is a pattern-recognition system that recognizes a person vein pattern and
uniqueness of the vein pattern. detecting various subject even twin or distinguish vein model in both hand from the same
user.Vein pattern recognition with a suitable optical system.when comparing these methods the biometric model is
compatiblewith the optical sensing device that allows object and pattern detection on surface.
Table2: Comparison of suitable factors for MFA: H—high; M—medium; L—low; n/a—unavailable.
Factor Universality Uniqueness Collectability Performance Acceptability
Password n/a L H H H
Token n/a M H H H
Voice M L M L H
Facial H L M L H
Fingerprint M H M H M
Hand –
geometry
M M M M M
Location n/a L M H M
Vein M M M M M
Behaviour H H L L L
70
14
4. Comparative Study of Different Methods for MFA
NO Methods Performance Application Advantage Disadvantage
1 retina authentication hand-
gesture authentication,heart
rate authentication,human
body print authentication
The performance of biometric
authenticationcanmeasurethree
factor:False Acceptance
Rate(FAR),FalseRejection
Rate(FRR),Equal Error Rate(ERR).
it is not costly and
easy to implement
They are more expensive.
2 Token presence Eachtokenhasauniqueseed which is
usedtogenerateapesudo-random
number.this seed is loaded into server
upon purchase of the token
and every 60 second.
Gmail, WhatsApp imporving
capabilities of mobile
devices.
it include the cost of
purchasing
,issuingandmanagingthe
tokenor cards.
3 Graphical password thismethodcaneffectivelyaddress the
gussing and shoulder-surfing issue of
otherimage-password
method
google re-capcha this approch
overcome the
limitation of the
traditional
password
system.
4 Smart Card based This method proposed to improve the
informationassuranceatlowcost but
also protect client privacy in
distributed system.
OTP Improve the
information
assurance in
distributed system
and improve
security feature
5 hand vein recognition this system use for pattern-
recognitionsystemthatrecognizesa
person specific physiological
behavioral charactristic that the
person processes.
Financial
application(ATM),
Health care
application,Emplo
yee time
recording /access
control.
identification number
and password since
the risk of
identifying theft and
other security
concerns.
hand contour detection has a
low discriminationratioin
camparison to other
biometric techniques and
nightprovideanincreased
number of falseacceptance.
70
15
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
6 Pre-shared number.GPS location
and time stamp
it is stores credential and digital
certificatesinsmartcardstoprovide
a strong authentication method.
PGTislessexpensive
and more secure.
GPSlocationwhichmakesit
less powerful campared toour
proposed approch.
7 Network based authentication
,local authentication
This all approach pose a security risk
in reducing the effectiveness or
strength of an authentication.
It is very flexible
and simple
authentication .
5. Conclusion
In this paper we proposed a new authentication scheme based on different MFA methods. Our approach can be effectively and securely used as user friendly authentication
mechanism for public and untrusted terminals. Preserving security and privacy is challenging issue in distribute system. In this review paper we have study different types of
methods and compare different types of methods. Table 1 contains comparisonoftextbasedpasswordandgraphicalpassword.Table2containscomparison of different methods.
6. Reference
1. Huang, X., Xiang, Y., Chonka, A., Zhou, J., & Deng, R. H. (2011). A generic framework for three- factor authentication: Preserving security and privacy in distributed systems. IEEE
Transactions on Parallel and Distributed Systems, 22(8), 1390-1397.
2. Sabzevar, A. P., & Stavrou, A. (2008, November). Universal multi-factor authentication using graphical passwords. In 2008 IEEE International Conference on Signal Image Technology
and Internet Based Systems (pp. 625-632). IEEE.
3. Kim, J. J., & Hong, S. P. (2011). A method of risk assessment for multi-factor authentication.Journal of Information Processing Systems, 7(1), 187-198.
4. Aloul, F., Zahidi, S., & El-Hajj, W. (2009, May). Two factor authentication using mobile phones. In 2009IEEE/ACS InternationalConference onComputerSystems andApplications (pp.641-
644). IEEE.
5. Abdurrahman, U. A., Kaiiali, M., & Muhammad, J. (2013, November). A new mobile-based multi- factor authentication scheme using pre-shared number, GPS location and time stamp.
In 2013 International Conference on Electronics, Computer and Computation (ICECCO) (pp. 293-296). IEEE.
6. Crisan, S., Tarnovan, I. G., Tebrean, B., & Crisan, T. E. (2011). Hand vein biometric authentication in optical multi-touch systems. In International Conference on Advancements of
MedicineandHealthCarethroughTechnology(pp.124-127).Springer,Berlin,Heidelberg.
7. Huang, X., Xiang, Y., Bertino, E., Zhou, J. and Xu, L., 2014. Robust multi-factor authentication for fragile communications. IEEE Transactions on Dependable and Secure Computing, 11(6),
pp.568- 581.
70
16
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
8. Wongnarukane, N. and Kuacharoen, P., 2016, December. Rhythm Authentication Using Multi- touch Technology: A New Method of Biometric Authentication. In International
Conference on Smart Computing and Communication (pp. 390-399). Springer, Cham.
9. De Souza, R.L., Lung, L.C. and Custódio, R.F., 2013, July. Multi-factor authentication in key management systems. In 2013 12th IEEE International Conference on Trust, Security and
Privacyin Computing and Communications (pp. 746-752). IEEE.
10.Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T. and Koucheryavy, Y., 2018. Multi-factor authentication: A survey. Cryptography, 2(1), p.1.

More Related Content

What's hot

IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET Journal
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET Journal
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes csandit
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...IRJET Journal
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesIAEME Publication
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET Journal
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET Journal
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 

What's hot (20)

Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
 
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 

Similar to IRJET- Technical Review of different Methods for Multi Factor Authentication

IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
IRJET- Smart Door Unit
IRJET- Smart Door UnitIRJET- Smart Door Unit
IRJET- Smart Door UnitIRJET Journal
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET Journal
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET Journal
 
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...IRJET Journal
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for BankingIRJET Journal
 
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET Journal
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET Journal
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET Journal
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office AdministrationIRJET Journal
 
IRJET- Keystroke Dynamics for user Authentication
IRJET-  	  Keystroke Dynamics for user AuthenticationIRJET-  	  Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user AuthenticationIRJET Journal
 
IRJET - BI: Blockchain in Insurance
IRJET -  	  BI: Blockchain in InsuranceIRJET -  	  BI: Blockchain in Insurance
IRJET - BI: Blockchain in InsuranceIRJET Journal
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET Journal
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET Journal
 

Similar to IRJET- Technical Review of different Methods for Multi Factor Authentication (20)

IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
IRJET- Smart Door Unit
IRJET- Smart Door UnitIRJET- Smart Door Unit
IRJET- Smart Door Unit
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured Communication
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
 
IRJET- Keystroke Dynamics for user Authentication
IRJET-  	  Keystroke Dynamics for user AuthenticationIRJET-  	  Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user Authentication
 
IRJET - BI: Blockchain in Insurance
IRJET -  	  BI: Blockchain in InsuranceIRJET -  	  BI: Blockchain in Insurance
IRJET - BI: Blockchain in Insurance
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

IRJET- Technical Review of different Methods for Multi Factor Authentication

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7007 TechnicalReviewofDifferentMethodsforMultiFactor Authentication Desai Vinanti V1, Patel Aeny M2, Ms. Jigna Solanky3 1Desai Vinanti V 2Patel Aeny M 3Ms. Jigna Solanky, Dept. of computer science, Babu Madhav Institute of Information and Technology, Gujarat, India. ------------------------------------------------------------------------***------------------------------------------------------------------------- Abstract - In this paper, we present different methods to authenticate a user. User authentication usually refers to user identification based on something user has, somethinguserisandsomethinguserdoes.Multi FactorAuthentication[MFA]isa security system that requirement more than two user credential to identify user for any transactional process. MFA is expected to be utilized for human-to- everything interactions by enabling fast and reliable authentication when accessing service. Multi-Factor Authentication (MFA) was proposed to provide a higher level of safety and facilitate continuous protection of computing devices as well as other critical services from unauthorized access by using more than two categories ofcredentials. Keywords – MFA, hand veins, GPS, biometric authentication, passwords, smart card, touch screen authentication. 1. Introduction Today security concerns are on the rise in all areas such as banks, governmental applications, healthcare industry, military organization, educational institutions, etc. Many different types of online services have become available with the development of the internet. Authentication is a process where a “user identifies himself by sending value to the system; the system authenticates his identity by computing and checking that it equals the stored value. MFA verified via the first authentication factor (usually password) along with a second or even a third factor such as smartcards, fingerprints, or user’s mouse movements. Authentication can prevent device and services from authorized access by validating user identity. MFA is an approach for authentication which requires the use of two or more of the universally recognized authentication factors: a knowledge- factor, a possession factor and a biometric factor. 1. Knowledge factor: - Something the user knows, ex: password 2. Possession factor: - Something the user has, ex: smart card 3. Biometric factor: - Something the useris 2. MFA Methods 2.1 Smartcardbasedapproach Nowadays smart card based password authentication has become one of the common authentication mechanism. In this [1] has used smart based authentication protocol. This protocol includes following phases: 1. Initialization: Algorithm for MFA is denoted by (k) -> (PK , SK) Where, k = security parameter, PK = Public key, SK = Secret key. 2. Registration: Inthisphasetheuserdataandpassword willgetregisteredtothesystemwiththe use of thisprotocol. 3. Login-Authentication:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7008 ThisphaseenabletheuserUtogetlogin tothesystemsuccessfullywiththeuseof PW, SC andbio-data. 4. Password changing: This phase will allow the user to change his/her password after a successful authentication. After changing the data, it will automatically updated in the smart card. 5. Bio-metric Changing: Just like the previous, User can also changetheirbio-metricsthatusedinthe system. Ex: Using the different finger user can change their bio-metrics. 2.2 UseofGraphicalpassword Author of this paper, [2] has used graphical password for user authentication. Graphical password is an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than typing alphanumeric words. This technique is classified into two categories: 1. Recognition Based: In this category, users will select images, icons or symbols from a collection of images. At the time of authentication, the usersneed to recognize their images, symbols or icons whichareselectedatthetimeofregistration among a set ofimages. 2. Re-call Based: In this category, users have to reproduce their passwords without being given any type of hints or reminder. Although this category is very easy and convenient, but it seems that users can hardly remember their passwords. Still it is more secure than the recognition based technique. Table1:Comparingthesecurityofgraphical passwordandtext-basedpasswords Issues Text-Based password Graphical Password Dictionary attack . Guessing . . Spyware/key- logger . . Shoulder surfing . . 2.3 MethodofRiskAssessment In this paper, [3] author have used different authentication methods for various services. Following services use following methods:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7009 1. Web Portal: Log-in, Registration, ID/Password retrieval 2. E-transaction: Login, Electronic payment 3. Financial Institution: Login, Account transfer 4. E-government: Login, Electronic binding 2.4 Token Presence In this proposed system [4] has used mobile phone as a software token as s OTP generation for short period of time that are unique. The system will have two modes of operation: 1. Connection-Less Authentication System: A onetime password (OTP) is generated without connecting the client to theserver. 2. SMS-Based Authentication System: The mobile phone sends to the server, via an SMS message, information unique to the user. The server checks the SMS content and if correct, returns a randomly generated OTP to the mobile phone. The following factors were chosen: 1. IMEI number: It stands for International Mobile Equipment Identity which is unique to each mobile phone allowingeachusertobeidentifiedbyhis device. 2. IMSI number: It stands for International Mobile Subscriber Identity which is a unique number associated with all GSM and Universal Mobile Telecommunications System. 3. PIN: This is required to verify that no oneotherthanusercanusethephoneto generate the user’sOTP. 2.5 MFA usingPGT The author [5] has use PGT [Preshared number, GPS Location and Time Stamp] that enhances security by generating a secret hash code based on a pre0-shared number and user’s current GPS location. The GPS location utilizing the device’s geographical location to validate whether access tothe device/service could begranted isa special case of location-based authentication. GPS signal could be easily jammed or consideredfaultydue to the propagation properties. Thus, it is recommended to utilize at least two location sources ,for example, GPS and wireless network cell ID. PGT Authentication Scheme Stage 1: Stage 2: In this stage app is responsible for generating the security token T1 according to the following equation where TS1 isthecurrenttime stamp: T1=hash (Pre-Shared Number + GPS + TS1); Stage 3: Server generates a security token T2 using equation1. Then it compares T1 with T2, if they match, the user is authenticated and his personal web page is sent back to device.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7010 2.6 HandVeinRecognition The authors [6] of this method, has used touch sensing system. One of the most user identification system is DiamondTouch by Mitsubushi Electric Research Laboratory. The system use a top mounted camera to track the user’s hand on the tactilesurface. In this stage, the user requests his personal web page URL through any internet- enabled device. The user provides his credentials to device which sends them to server for verification. If the user is verified, server asks for the security token. In this method close touches from different hands are hard to identify. This method will let user to identify by lying their hand on the surface. Lighting should be perform under a very tight optical window in the range of 750-940 mm. It acquire thepatternofthebackofyourhand.The belowimagedoatransformationthatextractthe vein pattern.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7011 2.7 DNA Recognition Humancell lines arean essential source ofuniqueDNAfingerprintinginformation.Even though the process is time- consuming and expensive, it provide highly secure facility as compare to other factors. The factors evaluated for the comparison of suitable factors for MFA are as below:  Universality: the presence of factor in each person.  Uniqueness: how well the factor differentiatesonepersonfromanother.  Collectability: how easy it is to acquire data for processing.  Performance: the achievable accuracy, speed, and robustness.  Acceptability: the degree of acceptance ofthetechnologybypeopleintheirdaily life. 2.8 UsingBiometricAuthentication Authentication is one of the most important issue in computer security management and information system. In biometric authentication such as fingerprint, handwriting,signature,orcharacteristicsofuser behaviours. Other biometric authenticationa are retina authentication, hand-gesture authentication, human body print authentication as well as the characteristics behaviours such as movement and keystroke authentication. This type of authentication are moresecurethenfingerprint. In that two methods are involved:  Namely ,physicalbiometric: It is uses human body parts such as fingerprint, retina, face,DNA and hand geometry.  Behavioral biometric: Itisusesmeasurablepatternsinhuman activities such as keystroke dynamic, voice ID and gaitanalysis. The performance of biometric authentication can measure three factor include:  False Acceptance Rate(FAR):It isthe measure of possibility thatthe biometric incorrectly permit an access attempt by an unauthorizeduser.  False Rejection Rate(FRR):It is the measure of the likehood that the biometric incorrectly denies an access attempt by an authorizeduser.  Equal Error Rate(EER):When FAR and FRR are equal, it is called EER. 2.9 UsingKeymangment: In this PKI(Public Key Infrastructure)based on e-health authentication architecture.It is stores user credentials and digital certificates in smart cards to provide a strong authentication method.  Client andserver: The KMS will be responsible for authenticating and authorizing the user to use cryptographic keys to create signature or to maintain the electronic data.it will work as a secure cryptoprocessor, maintain the correct execution.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7012  One timepassword: The principle of OTP is to sharea seed between a generator and a verifier where produce the same number.  Diffie-Hellman KeyExchange: The main porpose of sharing a secret though a public network and we used it to share the seed of the OTP protocol.  QR code: The QR code was invented by the Japanese corporation denso wave.the QR code makes the intraction between mobile devices and other data formatseasier. 3. LiteratureReview In paper [5], This paper presents a new mobile-based multi-factor authentication scheme based on a pre-shared number, GPS location and Time stamp (PGT).A new multi- factor authentication method was presented. It utilizes the user’s mobile device to generate an OTP which can be used as an authentication second factor. Unlike other methods of multi- factor authentication that employ the use of special devices like a security token which adds more cost to the authenticationsystem,PGTuses a mobile device whichisa commondeviceforall users. It generates a security token T2using equation . Then it compares T1 with T2 , if they match, the user is authenticated and his personal web page is sent back to D1.It increases the security risk as the shared seed can be intercepted by an intruder. Also the OTP does not contain user specific information like the user’s current GPS location which makes it less powerful comparedtoourproposedapproach. In paper [4], This paper focuses on the implementation of two-factor authentication methods using mobile phones. It provides the reader with an overview of the various parts of the system and the capabilities of the system.The proposed system has two option of running, either using a free and fast connection-less method or a slightly more expensive SMS based method. Both methods have been successfully implemented and tested, and secure.Such programs implement a One Time Password (OTP) algorithm. OTP algorithms are critical to the security of systems employing them since unauthorized users should not be able to guess the next password in thesequence. The proposed system has two option of running, either using a free and fast connection-less method or a slightly more expensive SMS based method. In paper [10], Multi-factor authentication is utilized for human-to- everything interactions by enabling fast, user- friendly, and reliable authentication when accessing a service.In MFA many method or source are available but in this paper DNA recognition method is used and in that Human cell lines are an essential resource for research, which is most frequently used in reverse genetic approaches.It is also a source of unique DNA fingerprinting information. Even though the process is time-consuming and expensive, it may be potentially utilized to pre-authorize the user to the highly secure facility along with other factors. In paper [7],in this method system is not to implement and provide its own, proprietary authentication factors but to enable transparent access to authentication factors provided by third parties. The basic requirement for the MFAS is the capability to connect and use all of the above mentioned authentication mechansims. The function of the MFAS is reduced to facilitating the authentication server in providing an online user interface. Some authentication factors perform a local verification of credentials on the user device or an attached/connected device and expose the authentication results so thattheycanbeusedby the MFAS. Inpaper[8], Authentication isone of the most important issues in computer security management and information systems. The biometric authentication that is widely used is fingerprint authentication . Fingerprint can be used to access a personal computer, access a smart phone. Keystroke authentication may be an alternative since it is not costly and easy to implement. In Biometric authentication unique biological characteristics of individuals to determine identity, which consists of two methods, namely, physical biometric and behavioral biometric.It can prevent shoulder surfing attacks. This is because users do not need to look at their keyboard when tapping or touching a touchpad or a touch screen. In paper[2], the user enters the password by clicking on a set of images, specific pixels of an image,or by drawing
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7013 a pattern in a pre-defined and secret order. graphical password employs graphical presentations such as icons, human faces or custom images to create a password .Our approach can be effectively and securely used as user-friendly authentication mechanism forpublic and un-trusted users. In paper[1], we demonstrate how to incorporate biometrics in the existing authentication based on smart card and password. smart-card-based password authentication has become one of the most common authentication mechanisms. simple dictionary attacks can crack passwords in a short time.A solution to preserve user privacy eventhe server has a copy of clients’ biometric data.the store data and the input biometric data. In paper[6],A biometric system is a pattern-recognition system that recognizes a person vein pattern and uniqueness of the vein pattern. detecting various subject even twin or distinguish vein model in both hand from the same user.Vein pattern recognition with a suitable optical system.when comparing these methods the biometric model is compatiblewith the optical sensing device that allows object and pattern detection on surface. Table2: Comparison of suitable factors for MFA: H—high; M—medium; L—low; n/a—unavailable. Factor Universality Uniqueness Collectability Performance Acceptability Password n/a L H H H Token n/a M H H H Voice M L M L H Facial H L M L H Fingerprint M H M H M Hand – geometry M M M M M Location n/a L M H M Vein M M M M M Behaviour H H L L L
  • 8. 70 14 4. Comparative Study of Different Methods for MFA NO Methods Performance Application Advantage Disadvantage 1 retina authentication hand- gesture authentication,heart rate authentication,human body print authentication The performance of biometric authenticationcanmeasurethree factor:False Acceptance Rate(FAR),FalseRejection Rate(FRR),Equal Error Rate(ERR). it is not costly and easy to implement They are more expensive. 2 Token presence Eachtokenhasauniqueseed which is usedtogenerateapesudo-random number.this seed is loaded into server upon purchase of the token and every 60 second. Gmail, WhatsApp imporving capabilities of mobile devices. it include the cost of purchasing ,issuingandmanagingthe tokenor cards. 3 Graphical password thismethodcaneffectivelyaddress the gussing and shoulder-surfing issue of otherimage-password method google re-capcha this approch overcome the limitation of the traditional password system. 4 Smart Card based This method proposed to improve the informationassuranceatlowcost but also protect client privacy in distributed system. OTP Improve the information assurance in distributed system and improve security feature 5 hand vein recognition this system use for pattern- recognitionsystemthatrecognizesa person specific physiological behavioral charactristic that the person processes. Financial application(ATM), Health care application,Emplo yee time recording /access control. identification number and password since the risk of identifying theft and other security concerns. hand contour detection has a low discriminationratioin camparison to other biometric techniques and nightprovideanincreased number of falseacceptance.
  • 9. 70 15 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 6 Pre-shared number.GPS location and time stamp it is stores credential and digital certificatesinsmartcardstoprovide a strong authentication method. PGTislessexpensive and more secure. GPSlocationwhichmakesit less powerful campared toour proposed approch. 7 Network based authentication ,local authentication This all approach pose a security risk in reducing the effectiveness or strength of an authentication. It is very flexible and simple authentication . 5. Conclusion In this paper we proposed a new authentication scheme based on different MFA methods. Our approach can be effectively and securely used as user friendly authentication mechanism for public and untrusted terminals. Preserving security and privacy is challenging issue in distribute system. In this review paper we have study different types of methods and compare different types of methods. Table 1 contains comparisonoftextbasedpasswordandgraphicalpassword.Table2containscomparison of different methods. 6. Reference 1. Huang, X., Xiang, Y., Chonka, A., Zhou, J., & Deng, R. H. (2011). A generic framework for three- factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 22(8), 1390-1397. 2. Sabzevar, A. P., & Stavrou, A. (2008, November). Universal multi-factor authentication using graphical passwords. In 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems (pp. 625-632). IEEE. 3. Kim, J. J., & Hong, S. P. (2011). A method of risk assessment for multi-factor authentication.Journal of Information Processing Systems, 7(1), 187-198. 4. Aloul, F., Zahidi, S., & El-Hajj, W. (2009, May). Two factor authentication using mobile phones. In 2009IEEE/ACS InternationalConference onComputerSystems andApplications (pp.641- 644). IEEE. 5. Abdurrahman, U. A., Kaiiali, M., & Muhammad, J. (2013, November). A new mobile-based multi- factor authentication scheme using pre-shared number, GPS location and time stamp. In 2013 International Conference on Electronics, Computer and Computation (ICECCO) (pp. 293-296). IEEE. 6. Crisan, S., Tarnovan, I. G., Tebrean, B., & Crisan, T. E. (2011). Hand vein biometric authentication in optical multi-touch systems. In International Conference on Advancements of MedicineandHealthCarethroughTechnology(pp.124-127).Springer,Berlin,Heidelberg. 7. Huang, X., Xiang, Y., Bertino, E., Zhou, J. and Xu, L., 2014. Robust multi-factor authentication for fragile communications. IEEE Transactions on Dependable and Secure Computing, 11(6), pp.568- 581.
  • 10. 70 16 International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 8. Wongnarukane, N. and Kuacharoen, P., 2016, December. Rhythm Authentication Using Multi- touch Technology: A New Method of Biometric Authentication. In International Conference on Smart Computing and Communication (pp. 390-399). Springer, Cham. 9. De Souza, R.L., Lung, L.C. and Custódio, R.F., 2013, July. Multi-factor authentication in key management systems. In 2013 12th IEEE International Conference on Trust, Security and Privacyin Computing and Communications (pp. 746-752). IEEE. 10.Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T. and Koucheryavy, Y., 2018. Multi-factor authentication: A survey. Cryptography, 2(1), p.1.