A Comparative Analysis of Various Multistep Login Authentication Mechanisms

  • Kaur N
  • Devgan M
N/ACitations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

Due to advancements and improvements in internet and communication systems, more people are relying on internet to store their confidential information. Earlier the idea of Static passwords was being used but most of the users try to use easily guessable, weak passwords or keywords from their personal information, which makes it easy for the intruders to guess their passwords in few combinations using Brute Force attack. Thus idea of using Multi-Factor Authentication has been introduced in the world of internet to harden the security of network and make it difficult for the attackers to crack systems. In this mechanism, users are required to provide some extra information along with their login Id and password. Most popular is using One-Time Passwords that are generated randomly and valid only for single login and even for short duration of time (usually 30 to 60 seconds). One-Time Passwords can be generated either online or offline via various mechanisms. In this paper, review of various Multi-step Authentication schemes has been performed to compare various authentication mechanisms.

Cite

CITATION STYLE

APA

Kaur, N., & Devgan, M. (2015). A Comparative Analysis of Various Multistep Login Authentication Mechanisms. International Journal of Computer Applications, 127(9), 20–26. https://doi.org/10.5120/ijca2015906472

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free