Research Article | Open Access | Download PDF
Volume 52 | Number 2 | Year 2017 | Article Id. IJETT-V52P217 | DOI : https://doi.org/10.14445/22315381/IJETT-V52P217
Enhanced Multifactor Authentication Scheme
Devender Kumar, Vikram Singh
Citation :
Devender Kumar, Vikram Singh, "Enhanced Multifactor Authentication Scheme," International Journal of Engineering Trends and Technology (IJETT), vol. 52, no. 2, pp. 109-114, 2017. Crossref, https://doi.org/10.14445/22315381/IJETT-V52P217
Abstract
A novel user authentication scheme has been presented in terms of added dimension to the 3D password paradigm. The three dimensional password is an authentication method that combines recognition, recall, tokens and biometrics in one authentication system. This paper presents the study of 3D password in virtual environment and proposes the addition of new dimensions, namely, pattern lock and time recording.
Keywords
Pattern Lock, Authentication, 3D Virtual Environment, Security.
References
[1] X.Suo, Y. Zhu, and G.S Owen (2005), “Graphical Passwords: A survey,” in Proceeding of 21st Annual Computer Security Conference, December 5-9, 2005, pp. 463-472.
[2] Vishal Kolhe, Vipul Gunjal, Sayali Kalasar, Pranjal Rathod (2013), “Secure Authentication with 3D Password,” International Journal of Engineering Science and Innovative Technology (IJESIT), Volume 2, Issue 2, March 2013.
[3] Grover Aman, Narang Winnie (2012), “4-D password: Strengthening the authentication scene,” International Journal of Scientific and Research Publications, volume 3, Issue 10, October-2012.
[4] Duhan Puja, Gupta Shilpi, Sangwan Sujata and Guwati Vinita, “Secured Authentication: 3D password”, in International Journal of Engineering and Management Sciences (IJEMS).
[5] Banita Chadha, Dr Puneet Goswami (2014), “3D Password- A secure tool,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4 issue 1, pp. 890-893, January 2014.
[6] David Chou, (2008), “Strong user authentication on the web,” on website http://msdn.microsoft.com/enus/ library/cc838351.aspx, August 2008.
[7] Federal Financial Institutions Examination Council. Authentication in an internet banking environment, 2011. [8] William E Burr, Donna F Dodson, and William T Polk (2004), “Electronic authentication guideline,” Citeseer, 2004.
[9] Maninder Singh and Sarbjeet Singh (2012), “Design and implementation of multi-tier authentication scheme in cloud,” International Journal of Computer Science Issues (IJCSI), vol. 9, no. 5, 2012.
[10] Ashish G Revar and Madhuri D Bhavsar (2011), “Securing user authentication using single sign-on in cloud computing,” in NUICONE2011, Nirma University International Conference on Engineering, pages 1-4, IEEE, 2011.
[11] HA Dinesha and VK Agrawal (2012), “Multi-level authentication technique for accessing cloud services,” in ICCCA2012, International Conference on Computing, Communication and Applications, pages 1-4, IEEE, 2012.