Two-Factor Authentication Application Using Artificial Intelligence to Support Academic Information Systems

Two-Factor Authentication Application Using Artificial Intelligence to Support Academic Information Systems

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-12
Year of Publication : 2024
Author : Thipwimon Chompookham, Wongpanya S. Nuankaew, Pratya Nuankaew
DOI : 10.14445/22315381/IJETT-V72I12P102

How to Cite?
Thipwimon Chompookham, Wongpanya S. Nuankaew, Pratya Nuankaew, "Two-Factor Authentication Application Using Artificial Intelligence to Support Academic Information Systems," International Journal of Engineering Trends and Technology, vol. 72, no. 12, pp. 14-29, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I12P102

Abstract
Integrating facial recognition technology is crucial for enhancing the security of online learning and consultation platforms, particularly in computer technology and engineering education. This project aims to synthesize components and technologies to develop a prototype of a two-factor authentication system that leverages artificial intelligence technology. The goal is to enhance the efficiency and capacity of identification verification. Moreover, a comprehensive evaluation will be carried out to determine the prototype's performance and level of acceptance. A purposive random sampling strategy was employed to select 40 participants from the Computer Technology and Digital Program at Rajabhat Maha Sarakham University, including students and faculty members. The research instruments comprised a thorough questionnaire encompassing several facets of the academic information system's development, a prototype of a two-factor authentication system, a quality assessment form, and a questionnaire to gauge the information system's acceptance. The performance criteria comprised accuracy, precision, recall, f1-score, average, and standard deviation. The findings indicated that the authorized prototype comprised four distinct modules: an authentication module, a member module, an information module, and a management module. The evaluation results for identifying faces, using CNN Face Detector, VGG-Face net, and classification by Logistic Regression, attained a remarkable accuracy of 83.54%. The precision and recall values were 0.84 and 0.88, respectively. The evaluation findings indicate that the overall quality is quite acceptable, with a mean score of 4.44 and a standard deviation of 0.55. Similarly, the user satisfaction with the 2FA system prototype is high, as indicated by a mean score of 4.54 and a standard deviation of 0.51.

Keywords
AI in Education, Facial recognition technology, Mobile learning support, Pedagogical prototype, Two-factor authentication.

References
[1] Yasser M. Hausawi, William H. Allen, and Gisela Susanne Bahr, “Choice-Based Authentication: A Usable-Security Approach,” In Universal Access in Human-Computer Interaction, Design and Development Methods for Universal Access, Heraklion, Crete, Greece, pp. 114-124, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Vashek Matyáš, and Zdeněk Řiha, “Security of Biometric Authentication Systems,” In 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), Krakow, Poland, pp. 19-28, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Sarah Abdulkader, Ayman Atia, and Mostafa-Sami Mostafa, “Authentication Systems: Principles and Threats,” Computer and Information Science, vol. 8, no. 3, pp. 155-179, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Tance Suleski et al., “A Review of Multi-Factor Authentication in The Internet of Healthcare Things,” Digital Health, vol. 9, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Zigang Chen et al., “FSMFA: Efficient Firmware-Secure Multi-Factor Authentication Protocol for IoT Devices,” Internet Things, vol. 21, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Tok Yen Xin, Norliza Katuk, and Ahmad Suki Che Mohamed Arif, “Smart Home Multi-Factor Authentication Using Face Recognition and One-Time Password on Smartphone,” International Journal of Interactive Mobile Technologies (IJIM), vol. 15, no. 24, pp. 32-48, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Mariam. M. Taha et al., “On Password Strength Measurements: Password Entropy and Password Quality,” In 2013 International Conference on Computing, Electrical and Electronics Engineering (ICCEEE), Khartoum, Sudan, pp. 497-501, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Eliana Stavrou, “Enhancing Cyber Situational Awareness: A New Perspective of Password Auditing Tools,” In 2018 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA), Glasgow, UK, pp. 1-4, 2018.
[9] Zahoor Ahmed Alizai, Noquia Fatima Tareen, and Iqra Jadoon, “Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures,” In 2018 International Conference on Applied and Engineering Mathematics (ICAEM), Taxila, Pakistan, pp. 1-5, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Franck Favier, “Smart Cards and Healthcare,” Card Technology Today, vol. 19, no. 11-12, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[11] T. İ. Gündem, and Ö. Armağan, “Efficient Storage of Healthcare Data in XML-Based Smart Cards,” Computer Methods and Programs in Biomedicine, vol. 81, no. 1, pp. 26-40, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Junbin Kang et al., “An Ultra-Light Weight and Secure RFID Batch Authentication Scheme for IoMT,” Computer Communications, vol. 167, pp. 48-54, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Sakhaa B. Al-Saedi, and Mohamed Mostafa A. Azim, “Radio Frequency Near Communication (RFNC) Technology: An Integrated RFID-NFC System for Objects’ Localization,” In 2017 9th IEEE-GCC Conference and Exhibition (GCCCE), Manama, Bahrain, pp. 1-5, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Anu Rathi et al., “Improvement of Existing Security System by Using Elliptic Curve and Biometric Cryptography,” In International Conference on Computing, Communication & Automation, Greater Noida, India, pp. 994-998, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Philip Black, “Building A Trusted Guardian for Our Biometric Identities,” Biometric Technology Today, vol. 2021, no. 6, pp. 7-10, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Chunhua Jin et al., “EBIAC: Efficient Biometric Identity-Based Access Control for Wireless Body Area Networks,” Journal of Systems Architecture, vol. 121, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Yasmin Makki Mohialden, Nadia Mahmood Hussien, and Doaa Muhsin Abd Ali, “Enhancing User Authentication with Facial Recognition and Feature-Based Credentials,” Journal La Multiapp, vol. 4, no. 6, pp. 243-252, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Mohammed Abdulhakim Al-Absi et al., “Real-Time Access Control System Method Using Face Recognition,” In Proceedings of International Conference on Smart Computing and Cyber Security, Springer, Singapore, pp. 101-108, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Gabit Tolendiyev, Hyotaek Lim, and Byung-Gook Lee, “A Margin-based Face Liveness Detection with Behavioral Confirmation,” International Journal of Internet, Broadcasting and Communication, vol. 13, no. 2, pp. 187-194, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] R. Rameswari, “Automated Access Control System Using Face Recognition,” Materials Today: Proceedings, vol. 45, pp. 1251-1256, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Sheng Chen et al., “MobileFaceNets: Efficient CNNs for Accurate Real-Time Face Verification on Mobile Devices,” In Biometric Recognition, In Lecture Notes in Computer Science, Springer, Cham, pp. 428-438, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[22] D. Sagar, and Murthy K. R. Narasimha, “Development and Simulation Analysis of a Robust Face Recognition Based Smart Locking System,” In Innovations in Electronics and Communication Engineering, in Lecture Notes in Networks and Systems, Springer, Singapore, pp. 3-14, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Ji-Hae Kim et al., “Efficient Facial Expression Recognition Algorithm Based on Hierarchical Deep Neural Network Structure,” IEEE Access, vol. 7, pp. 41273-41285, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Melda Agnes Manuhutu, Lulu Jola Uktolseja, and Sherly Gaspersz, “Academic Information System for Student (Case Study: Victory University of Sorong),” International Journal of Computer Applications, vol. 180, no. 43, pp. 26-33, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[25] H. P. Utomo, A. T. Bon, and M. Hendayun, “Academic Information System Support in the Era of Education 3.0,” International Research and Innovation Summit (IRIS2017), Melaka, Malaysia, vol. 226, no. 1, pp. 1-9, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Etin Indrayani, “Management of Academic Information System (AIS) at Higher Education in the City of Bandung,” Procedia - Social and Behavioral Sciences, vol. 103, pp. 628-636, 2013.
[CrossRef] [Google Scholar] [Publisher Link]