Multifactor Authentication - A Study on User Preference, Remembering Ability, Error rate and Time Consumption

Authors

  • S. Vaithyasubramanian Sathyabama Institute of Science and Technology, Chennai, India. Author

DOI:

https://doi.org/10.61841/phgq8c41

Keywords:

Authentication,, Password, Multifactor Authentication,, Information Security.

Abstract

In information security, the key element in course of action of identifying an individual based on their username and password is Authentication. In recent years, Information technology and security environment have been changing rapidly and dramatically. Various attack methods and vulnerabilities enforce service providers to look into alternate measures to enrich security process. To enhance security of the data web developers, service providers, professionals and researchers have developed different ways for users to authenticate in order to establish their access. Authentication approaches are poised to undergo some similar transformations in response. The system to address this challenge is by utilizing and integrating various existing authentication factors. Multifactor authentication is a technique comprises of the known validation process such as alphanumeric, graphical and biometric authentication. This process is easy to use, flexible and solid in authentications to expansive scale but requires memorability of passwords and time consuming. In this paper, study on user preference, remembering ability, error rate and time consumption of Multifactor authentication process is executed.

 

Downloads

Download data is not yet available.

References

[1] Di Pietro R, Me G and Strangio M A (2005). “A two-factor mobile authentication scheme for secure financial transactions”, International Conference in Mobile Business, pp. 28-34.

[2] Maria S. Millan, Elisabet Perez-Cabre, and Bahram Javidi (2006), "Multifactor authentication reinforces optical security," Opt. Lett. 31, 721-723.

[3] Steinberg, Joseph (2007). "System and method of using two or more multi-factor authentication mechanisms to authenticate online parties." U.S. Patent Application 11/606,788.

[4] Bhargav-Spantzel, A., Squicciarini, A. C., Modi, S., Young, M., Bertino, E., & Elliott, S. J. (2007). Privacy preserving multi-factor authentication with biometrics. Journal of Computer Security, 15(5), 529-560.

[5] Sabzevar A P and Stavrou A (2008). “Universal multi-factor authentication using graphical passwords”,

In Signal Image Technology and Internet Based Systems, pp. 625-632.

[6] Aloul, F., Zahidi, S., & El-Hajj, W. (2009, May). Two factor authentication using mobile phones. In Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS International Conference on, 641-644. IEEE.

[7] Gunson, N, Marshall, D, Morton, H & Jack, M (2011). "User perceptions of security and usability of single factor and two-factor authentication in automated telephone banking" Computers & Security, vol. 30, no. 4,

pp. 208-220.

[8] Mao Z, Florencio D and Herley C (2011). “Painless migration from passwords to two factor authentication”,

In Information Forensics and Security, pp. 1-6.

[9] Adeoye O S (2012). “Evaluating the performance of two-factor authentication solution in the banking sector”,

International Journal of Computer Science, Vol. 9, No.4, pp. 457-462.

[10] Singhal M and Tapaswi S (2012). “Software Tokens Based Two Factor Authentication Scheme”, International Journal of Information and Electronics Engineering, Vol. 2, No. 3, pp. 383.

[11] Dmitrienko A, Liebchen C, Rossow C and Sadeghi A R (2014). “On the security of mobile two-factor authentication”, In International Conference on Financial Cryptography and Data Security, pp. 365-383.

[12] Asoke Nath and Tanushree Mondal (2016). "Issues and Challenges in Two Factor Authentication Algorithms"

International Journal of Latest Trends in Engineering and Technology, Vol. 6, Issue 3, 318 - 327.

[13] Asif Amin, Israr ul Haq, Monisa Nazir (2017, July). "Two factor Authentication" International Journal of Computer Science and Mobile Computing, Vol.6, Issue.7, 5-8.

[14] Wang, C., Xu, G., & Li, W. (2018). "A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment". Security and Communication Networks, Vol. 2018.

[15] Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). "Multi-factor authentication: A survey". Cryptography, 2(1), 1.

Downloads

Published

30.06.2020

How to Cite

Vaithyasubramanian, S. (2020). Multifactor Authentication - A Study on User Preference, Remembering Ability, Error rate and Time Consumption. International Journal of Psychosocial Rehabilitation, 24(4), 4927-4932. https://doi.org/10.61841/phgq8c41