Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Akshay Nishikant Gawde
DOI Link: https://doi.org/10.22214/ijraset.2024.63645
Certificate: View Certificate
In today’s world, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. With the rapid evolution of wireless communication technology, user authentication is essential to ensure the security of wireless communication technology. It assists humans to interact with everything by enabling services that are faster, user-friendly and reliable for authentication. As from conducted surveys, a common user may have multiple online accounts which requires passwords. As an evolution in wireless communication, the user authentication plays an important role. In the process of authentication, passwords plays an important role. Importance of MFA ensures the user’s account does not get easily attacked by the attackers and also ensures that the sensitive information of the user remains safe. The objective of the system outcome is to enhance the current login authentication system. It provides solutions for making password breaking more difficult as well as convinces users to create passwords that are hard to break. This research delves into the effectiveness of MFA in diverse contexts, including its role in preventing phishing attacks, enhancing security, and adapting to emerging threats. MFA goes beyond conventional password protection, requiring users to authenticate through a combination of knowledge-based factors (Passwords, Pins), possession- based factors(Tokens, Smart-phones), and inherence-based factors(Bio-metrics). This paper explores the concept of MFA, which means combining the various types of authentication factors to enhance user security.
I. INTRODUCTION
Due to increasing technology, there is also an increase in the number of smart devices and various electronic gadgets across the globe. In situation where the user’s are connected across the globe, the user’s data is being transmitted over the network, this is where the authentication comes into picture. Authentication is an activity to authenticate the users credentials that wish to perform the actions on the system. Authentication process is completed when the users credentials is matched with the credentials stored in the system and then the user is granted access. Passwords plays an important role in the process of authentication. In the process of authentication, the user will first enter the password that will be transmitted to the authentication server, to allow the server to grant access to authorized user. MFA is a common and most increasingly used security measure which is been implemented in day-to-day online services which ensure to validate the user’s identity to provide access to the system.
Authentication is a fundamental safeguard against any illegal access to any devices or any applications that may require sensitive information regardless it may be offline or online. In earlier days, the only method for authentication while performing transactions was primarily the physical presence; as compared to present days with the advanced technology, the validation is based on the sender identification only. It is important to protect our own account because our credit is priceless. It is hard to trace the attackers in the cyber-world. The secure login system is crucial to ensure the safety online.
From a survey conducted it shows that, the Cam4 data breach that happened in March 2020 approximately exposed 10 billion user records which resulted in stolen credentials in different sectors such as Bank, Health-care, Institutes and many more organizations including Twitter and Facebook.Therefore, this project would like to provide alternative ways to securely log in to a system.
The current MFA methods requires two or more authentication methods from the user. Following are the methods used for authentication:
II. RESEARCH ELABORATION
A. Objectives
B. Scope
C. Methodology
To understand the impact of digital security awareness, a comprehensive approach was undertaken, including literature reviews, surveys, and case studies. This research aims to identify best practices and strategies for improving awareness of digital security across diverse populations.
III. DESIGN AND IMPLEMENTATION
A. Types Of Authentication Factors
Key areas to explore could include different types of authentication factors (e.g., biometrics, passwords, tokens), usability considerations, security vulnerabilities, and the impact of MFA on overall system security. We can study the various trends, challenges, and emerging technologies in the field of MFA to provide a comprehensive overview.
Different types of Authentication factors used in this project are as follows:
The user enters the credentials and then he will receive OTP on the registered phone number and after entering the correct OTP the user gets access to the system.
B. Benefits of Multiple Factor Authentication
C. Challenges faced in Multiple Factor Authentication
V. ACKNOWLEDGMENT
I would like to express my heartfelt gratitude to Mr. Chayan Bhattacharjee for his valuable guidance and support throughout the development of this research paper. His insights and expertise have helped define the scope and quality of this project. I am also grateful to Mrs. Sumedha Barve, the head of the IT Department, for her continuous support and encouragement. Her leadership and vision provided a solid foundation for this research, allowing me to explore and contribute to this interesting topic. Thank you both for your mentoring and believing in this idea.
This paper is to help understand the concept of Multi-Factor Authentication (MFA) and spread awareness about its benefits. Multi-factor authentication being used in one form or another is much more secure than only using a username and password. The necessity of utilizing MFA cannot be overstated, as it will increase the security of any system. With users becoming increasingly aware of security issues and the importance of protecting their online data, their first step in increasing the security of their accounts should be to enable multi-factor authentication. Moreover, giving the fact of MFA benefit, where it wins over 2FA by adding third layer of security in addition to user’s credentials and PIN. The first step is for companies to implement MFA options for their users. User’s will be able to login to several common services and applications by checking credentials one time and leveraging Multi-Factor Authentication. The implementation of the authentication systems fulfilled the goal of implementing a system that can easily be adapted to use different authentication methods. The analysis of the field of continuous authentication showed that it constitutes various factors for this type of authentication. One of the most promising directions in MFA is behavior-based biometrics providing entirely new ways of authenticating the users. This work provided a systematic overview of the state in both technical and usability issues, as well as the major challenges in currently available MFA systems. The implementation of multi-factor authentication methods should only increase year by year allowing it to become more familiar to the users.
[1] International Journal of Computer Science and Information Technology Research ,Authors: Norah Alyousif, Sultan Alhabis Research Publish Journal (https://www.researchpublish.com/papers/the-necessity- of-multi-factor-authentication) [2] Multi-Factor Authentication: A Survey, Author: Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey AndreevResearchGate (https://www.researchgate.net/publication/322288752_Multi- Factor_Authentication_A_Survey) [3] Best Practice in Multi-Factor Authentication, Authors: Joseph Williamson, Kevin CurranResearchGate (https://www.researchgate.net/publication/351852137_Best_Practice_in_Multi factor_Authentication) [4] Multi-Factor Authentication, Authors: Emin Huseynov, Jean-Marc SeigneurScienceDirect (https://www.sciencedirect.com/topics/computer-science/multifactor- authentication) [5] Privacy preserving multi-factor authentication with biometrics, Authors:Shimon Modi, Matthew Young, Anna Cinzia Squicciarini, Abhilasha Bhargav Spantzel ResearchGate:(https://www.researchgate.net/publication/220065411_Privacy_preserving_multi-factor_authentication_with_biometrics) [6] Secure Login System for Online Transaction Using Two Layer Authentication Protocol, Author:Somnath Sinha ,Research-gate(https://www.researchgate.net/publication/345384866_Secure_Login_System_for_Online_Transaction_Using_Two_Layer_Authentication_Protocol) [7] Working of 2FA authentication:(https://www.merchantfraudjournal.com/two-factor-authentication-work/) [8] An Innovative Multi-Factor Authentication Approach, Author:Peter Voege, IEEE(https://ieeexplore.ieee.org/document/9851710) [9] A Comprehensive Study on Authentication Systems, Authors:Anagha Chaudhari, Ashish Pawar, Adesh Pawar, Ajay Pawar, Ganesh Pawar IEEE(https://ieeexplore.ieee.org/document/10392029) [10] Multi-factor Authentication as a Service, Authors:Yogendra Shah; Vinod Choyi; Andreas U. Schmidt; Lakshmi Subramanian, IEEE(https://ieeexplore.ieee.org/document/7130879) [11] Secure login authentication system, Author:CHOW WEN CHAI (http://eprints.utar.edu.my/2855/1/CS-2018-1405547-1.pdf) [12] Secure login authentication system using captcha based graphical password technique, Authors:Mr. Ganesh Satkar, Prof. Santosh Biradar (https://www.irjmets.com/uploadedfiles/paper/issue_3_march_2022/19657/final/fin_irjmets1646895926.pdf)
Copyright © 2024 Akshay Nishikant Gawde. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET63645
Publish Date : 2024-07-16
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here