3CAuth - A Novel Multi-Factor Authentication Scheme Using QR-Code

نویسندگان

  • Harini Narasimhan
  • T. R. Padmanabhan
چکیده

A multi factor authentication scheme called ’3C-Auth’ is proposed in this paper. The scheme carries out a comprehensive authentication process using the smart card, secret-pin, registered finger print, and registered mobile number of the user. The user’s password is neither transmitted in plaintext form nor revealed to the authentication server. The scheme is shone to be proof against phishing, password guessing, replay, or stolen-verifier attacks. Resistance to parallel session and denial of service attacks and the use of QR-Code in preference to SMS for OTP transfer together, make the scheme attractive for operation under peak loads. Integration of the “3C-Auth” into Multi-Layered Filtering (MLF) scheme leads to secure handling of peak loads on the server ensuring concurrency and availability as well. This clearly enhances the QoS in terms of making right admittance to right resources.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel User Authentication Scheme Based on QR-Code

User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel. Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access....

متن کامل

2CAuth: A New Two Factor Authentication Scheme Using QR-Code

Password based schemes has been the standard means of authentication over decades. Enhancements use entities like ownership (something one possess), knowledge (something one knows), and inherence (something one is) as first factor and mobile phones as token less second factor, in combinations, to offer different levels of security assurances, trading off usability. In this paper we present ‘2CA...

متن کامل

A NovelQR-Code Authentication Protocol Using Visual Cryptography for Secure Communications

Visual cryptography (VC) is a distinct type of secret sharing scheme which hides secret images in share images such that, when the shares are superimposed, a hidden secret image is revealed. It does not require the complex computational method to decode the secret information. The paper proposes a novel Quick Response (QR) code authentication system using Visual Cryptography. The passwords for ...

متن کامل

Subsampling-Based Image Tamper Detection and Recovery Using Quick Response Code

Quick response (QR) code is the prevalent trademark for a type of matrix barcode symbol. That code is always scanned to efficiently acquire data, especially for mobile device users. It involves the capabilities of data storage, reliable readability and strong error correction. This paper utilizes these properties of a QR code to propose an image tamper detection and recovery scheme for grayscal...

متن کامل

An effective Two Factor Authentication Method using QR code

The most prevalent form of login has used an ID and password which is classified 1 factor authentication. However the lax of security, user required the more secure way to login so firms have implemented 2 factor authentication involving OTP(One time Password). Despite the increased security, users must endure the inconvenience of downloading a program on their device and inputting a 6 to 8 dig...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2016