International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 52 | Number 2 | Year 2017 | Article Id. IJETT-V52P217 | DOI : https://doi.org/10.14445/22315381/IJETT-V52P217

Enhanced Multifactor Authentication Scheme


Devender Kumar, Vikram Singh

Citation :

Devender Kumar, Vikram Singh, "Enhanced Multifactor Authentication Scheme," International Journal of Engineering Trends and Technology (IJETT), vol. 52, no. 2, pp. 109-114, 2017. Crossref, https://doi.org/10.14445/22315381/IJETT-V52P217

Abstract

 A novel user authentication scheme has been presented in terms of added dimension to the 3D password paradigm. The three dimensional password is an authentication method that combines recognition, recall, tokens and biometrics in one authentication system. This paper presents the study of 3D password in virtual environment and proposes the addition of new dimensions, namely, pattern lock and time recording.


Keywords

Pattern Lock, Authentication, 3D Virtual Environment, Security.

References

[1] X.Suo, Y. Zhu, and G.S Owen (2005), “Graphical Passwords: A survey,” in Proceeding of 21st Annual Computer Security Conference, December 5-9, 2005, pp. 463-472.
[2] Vishal Kolhe, Vipul Gunjal, Sayali Kalasar, Pranjal Rathod (2013), “Secure Authentication with 3D Password,” International Journal of Engineering Science and Innovative Technology (IJESIT), Volume 2, Issue 2, March 2013.
[3] Grover Aman, Narang Winnie (2012), “4-D password: Strengthening the authentication scene,” International Journal of Scientific and Research Publications, volume 3, Issue 10, October-2012.
[4] Duhan Puja, Gupta Shilpi, Sangwan Sujata and Guwati Vinita, “Secured Authentication: 3D password”, in International Journal of Engineering and Management Sciences (IJEMS).
[5] Banita Chadha, Dr Puneet Goswami (2014), “3D Password- A secure tool,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4 issue 1, pp. 890-893, January 2014.
[6] David Chou, (2008), “Strong user authentication on the web,” on website http://msdn.microsoft.com/enus/ library/cc838351.aspx, August 2008.
[7] Federal Financial Institutions Examination Council. Authentication in an internet banking environment, 2011. [8] William E Burr, Donna F Dodson, and William T Polk (2004), “Electronic authentication guideline,” Citeseer, 2004.
[9] Maninder Singh and Sarbjeet Singh (2012), “Design and implementation of multi-tier authentication scheme in cloud,” International Journal of Computer Science Issues (IJCSI), vol. 9, no. 5, 2012.
[10] Ashish G Revar and Madhuri D Bhavsar (2011), “Securing user authentication using single sign-on in cloud computing,” in NUICONE2011, Nirma University International Conference on Engineering, pages 1-4, IEEE, 2011.
[11] HA Dinesha and VK Agrawal (2012), “Multi-level authentication technique for accessing cloud services,” in ICCCA2012, International Conference on Computing, Communication and Applications, pages 1-4, IEEE, 2012.

Time: 0.0013 sec Memory: 32 KB
Current: 1.88 MB
Peak: 4 MB