Enhanced Multifactor Authentication Scheme

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2017 by IJETT Journal
Volume-52 Number-2
Year of Publication : 2017
Authors : Devender Kumar, Vikram Singh
DOI :  10.14445/22315381/IJETT-V52P217


Devender Kumar, Vikram Singh "Enhanced Multifactor Authentication Scheme", International Journal of Engineering Trends and Technology (IJETT), V52(2),109-114 October 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

A novel user authentication scheme has been presented in terms of added dimension to the 3D password paradigm. The three dimensional password is an authentication method that combines recognition, recall, tokens and biometrics in one authentication system. This paper presents the study of 3D password in virtual environment and proposes the addition of new dimensions, namely, pattern lock and time recording.

[1] X.Suo, Y. Zhu, and G.S Owen (2005), “Graphical Passwords: A survey,” in Proceeding of 21st Annual Computer Security Conference, December 5-9, 2005, pp. 463-472.
[2] Vishal Kolhe, Vipul Gunjal, Sayali Kalasar, Pranjal Rathod (2013), “Secure Authentication with 3D Password,” International Journal of Engineering Science and Innovative Technology (IJESIT), Volume 2, Issue 2, March 2013.
[3] Grover Aman, Narang Winnie (2012), “4-D password: Strengthening the authentication scene,” International Journal of Scientific and Research Publications, volume 3, Issue 10, October-2012.
[4] Duhan Puja, Gupta Shilpi, Sangwan Sujata and Guwati Vinita, “Secured Authentication: 3D password”, in International Journal of Engineering and Management Sciences (IJEMS).
[5] Banita Chadha, Dr Puneet Goswami (2014), “3D Password- A secure tool,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4 issue 1, pp. 890-893, January 2014.
[6] David Chou, (2008), “Strong user authentication on the web,” on website http://msdn.microsoft.com/enus/ library/cc838351.aspx, August 2008.
[7] Federal Financial Institutions Examination Council. Authentication in an internet banking environment, 2011. [8] William E Burr, Donna F Dodson, and William T Polk (2004), “Electronic authentication guideline,” Citeseer, 2004.
[9] Maninder Singh and Sarbjeet Singh (2012), “Design and implementation of multi-tier authentication scheme in cloud,” International Journal of Computer Science Issues (IJCSI), vol. 9, no. 5, 2012.
[10] Ashish G Revar and Madhuri D Bhavsar (2011), “Securing user authentication using single sign-on in cloud computing,” in NUICONE2011, Nirma University International Conference on Engineering, pages 1-4, IEEE, 2011.
[11] HA Dinesha and VK Agrawal (2012), “Multi-level authentication technique for accessing cloud services,” in ICCCA2012, International Conference on Computing, Communication and Applications, pages 1-4, IEEE, 2012.

Pattern Lock, Authentication, 3D Virtual Environment, Security.