8. 70
14
4. Comparative Study of Different Methods for MFA
NO Methods Performance Application Advantage Disadvantage
1 retina authentication hand-
gesture authentication,heart
rate authentication,human
body print authentication
The performance of biometric
authenticationcanmeasurethree
factor:False Acceptance
Rate(FAR),FalseRejection
Rate(FRR),Equal Error Rate(ERR).
it is not costly and
easy to implement
They are more expensive.
2 Token presence Eachtokenhasauniqueseed which is
usedtogenerateapesudo-random
number.this seed is loaded into server
upon purchase of the token
and every 60 second.
Gmail, WhatsApp imporving
capabilities of mobile
devices.
it include the cost of
purchasing
,issuingandmanagingthe
tokenor cards.
3 Graphical password thismethodcaneffectivelyaddress the
gussing and shoulder-surfing issue of
otherimage-password
method
google re-capcha this approch
overcome the
limitation of the
traditional
password
system.
4 Smart Card based This method proposed to improve the
informationassuranceatlowcost but
also protect client privacy in
distributed system.
OTP Improve the
information
assurance in
distributed system
and improve
security feature
5 hand vein recognition this system use for pattern-
recognitionsystemthatrecognizesa
person specific physiological
behavioral charactristic that the
person processes.
Financial
application(ATM),
Health care
application,Emplo
yee time
recording /access
control.
identification number
and password since
the risk of
identifying theft and
other security
concerns.
hand contour detection has a
low discriminationratioin
camparison to other
biometric techniques and
nightprovideanincreased
number of falseacceptance.
9. 70
15
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
6 Pre-shared number.GPS location
and time stamp
it is stores credential and digital
certificatesinsmartcardstoprovide
a strong authentication method.
PGTislessexpensive
and more secure.
GPSlocationwhichmakesit
less powerful campared toour
proposed approch.
7 Network based authentication
,local authentication
This all approach pose a security risk
in reducing the effectiveness or
strength of an authentication.
It is very flexible
and simple
authentication .
5. Conclusion
In this paper we proposed a new authentication scheme based on different MFA methods. Our approach can be effectively and securely used as user friendly authentication
mechanism for public and untrusted terminals. Preserving security and privacy is challenging issue in distribute system. In this review paper we have study different types of
methods and compare different types of methods. Table 1 contains comparisonoftextbasedpasswordandgraphicalpassword.Table2containscomparison of different methods.
6. Reference
1. Huang, X., Xiang, Y., Chonka, A., Zhou, J., & Deng, R. H. (2011). A generic framework for three- factor authentication: Preserving security and privacy in distributed systems. IEEE
Transactions on Parallel and Distributed Systems, 22(8), 1390-1397.
2. Sabzevar, A. P., & Stavrou, A. (2008, November). Universal multi-factor authentication using graphical passwords. In 2008 IEEE International Conference on Signal Image Technology
and Internet Based Systems (pp. 625-632). IEEE.
3. Kim, J. J., & Hong, S. P. (2011). A method of risk assessment for multi-factor authentication.Journal of Information Processing Systems, 7(1), 187-198.
4. Aloul, F., Zahidi, S., & El-Hajj, W. (2009, May). Two factor authentication using mobile phones. In 2009IEEE/ACS InternationalConference onComputerSystems andApplications (pp.641-
644). IEEE.
5. Abdurrahman, U. A., Kaiiali, M., & Muhammad, J. (2013, November). A new mobile-based multi- factor authentication scheme using pre-shared number, GPS location and time stamp.
In 2013 International Conference on Electronics, Computer and Computation (ICECCO) (pp. 293-296). IEEE.
6. Crisan, S., Tarnovan, I. G., Tebrean, B., & Crisan, T. E. (2011). Hand vein biometric authentication in optical multi-touch systems. In International Conference on Advancements of
MedicineandHealthCarethroughTechnology(pp.124-127).Springer,Berlin,Heidelberg.
7. Huang, X., Xiang, Y., Bertino, E., Zhou, J. and Xu, L., 2014. Robust multi-factor authentication for fragile communications. IEEE Transactions on Dependable and Secure Computing, 11(6),
pp.568- 581.
10. 70
16
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
8. Wongnarukane, N. and Kuacharoen, P., 2016, December. Rhythm Authentication Using Multi- touch Technology: A New Method of Biometric Authentication. In International
Conference on Smart Computing and Communication (pp. 390-399). Springer, Cham.
9. De Souza, R.L., Lung, L.C. and Custódio, R.F., 2013, July. Multi-factor authentication in key management systems. In 2013 12th IEEE International Conference on Trust, Security and
Privacyin Computing and Communications (pp. 746-752). IEEE.
10.Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T. and Koucheryavy, Y., 2018. Multi-factor authentication: A survey. Cryptography, 2(1), p.1.