Multifactor Authentication - A Study on User Preference, Remembering Ability, Error rate and Time Consumption
DOI:
https://doi.org/10.61841/phgq8c41Keywords:
Authentication,, Password, Multifactor Authentication,, Information Security.Abstract
In information security, the key element in course of action of identifying an individual based on their username and password is Authentication. In recent years, Information technology and security environment have been changing rapidly and dramatically. Various attack methods and vulnerabilities enforce service providers to look into alternate measures to enrich security process. To enhance security of the data web developers, service providers, professionals and researchers have developed different ways for users to authenticate in order to establish their access. Authentication approaches are poised to undergo some similar transformations in response. The system to address this challenge is by utilizing and integrating various existing authentication factors. Multifactor authentication is a technique comprises of the known validation process such as alphanumeric, graphical and biometric authentication. This process is easy to use, flexible and solid in authentications to expansive scale but requires memorability of passwords and time consuming. In this paper, study on user preference, remembering ability, error rate and time consumption of Multifactor authentication process is executed.
Downloads
References
[1] Di Pietro R, Me G and Strangio M A (2005). “A two-factor mobile authentication scheme for secure financial transactions”, International Conference in Mobile Business, pp. 28-34.
[2] Maria S. Millan, Elisabet Perez-Cabre, and Bahram Javidi (2006), "Multifactor authentication reinforces optical security," Opt. Lett. 31, 721-723.
[3] Steinberg, Joseph (2007). "System and method of using two or more multi-factor authentication mechanisms to authenticate online parties." U.S. Patent Application 11/606,788.
[4] Bhargav-Spantzel, A., Squicciarini, A. C., Modi, S., Young, M., Bertino, E., & Elliott, S. J. (2007). Privacy preserving multi-factor authentication with biometrics. Journal of Computer Security, 15(5), 529-560.
[5] Sabzevar A P and Stavrou A (2008). “Universal multi-factor authentication using graphical passwords”,
In Signal Image Technology and Internet Based Systems, pp. 625-632.
[6] Aloul, F., Zahidi, S., & El-Hajj, W. (2009, May). Two factor authentication using mobile phones. In Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS International Conference on, 641-644. IEEE.
[7] Gunson, N, Marshall, D, Morton, H & Jack, M (2011). "User perceptions of security and usability of single factor and two-factor authentication in automated telephone banking" Computers & Security, vol. 30, no. 4,
pp. 208-220.
[8] Mao Z, Florencio D and Herley C (2011). “Painless migration from passwords to two factor authentication”,
In Information Forensics and Security, pp. 1-6.
[9] Adeoye O S (2012). “Evaluating the performance of two-factor authentication solution in the banking sector”,
International Journal of Computer Science, Vol. 9, No.4, pp. 457-462.
[10] Singhal M and Tapaswi S (2012). “Software Tokens Based Two Factor Authentication Scheme”, International Journal of Information and Electronics Engineering, Vol. 2, No. 3, pp. 383.
[11] Dmitrienko A, Liebchen C, Rossow C and Sadeghi A R (2014). “On the security of mobile two-factor authentication”, In International Conference on Financial Cryptography and Data Security, pp. 365-383.
[12] Asoke Nath and Tanushree Mondal (2016). "Issues and Challenges in Two Factor Authentication Algorithms"
International Journal of Latest Trends in Engineering and Technology, Vol. 6, Issue 3, 318 - 327.
[13] Asif Amin, Israr ul Haq, Monisa Nazir (2017, July). "Two factor Authentication" International Journal of Computer Science and Mobile Computing, Vol.6, Issue.7, 5-8.
[14] Wang, C., Xu, G., & Li, W. (2018). "A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment". Security and Communication Networks, Vol. 2018.
[15] Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). "Multi-factor authentication: A survey". Cryptography, 2(1), 1.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.