A Novel Authentication Mechanism with Efficient Math Based Approach

Authors

  • Balajee R M , Suresh Kallam , M K Jayanthi Kannan

Keywords:

Self Relying Authentication, Multi Factor Authentication (MFA), Permutation, Math Based Approach (MBA), Challenge Based Password (CBP), Dynamic Password Protocol (DPP), Dynamic Pattern Image (DPI), Dynamic Array Pin (DAP), PicassoPass (PP) and Bag of Password (BP).

Abstract

The authentication and session handling plays a vital role on the security of any device or data present on that. The top web applications including the communication mail, social information sharing platforms, financial transactions are controlling the spoofing attacks and try to kept it in minimal by using the MFA based OTP mechanism. This well known OTP mechanism is also start to lose its grip over the security with the statistical proof of losing 1434.75 crore rupees between April 2020 to March 2022. This abnormal scenario is pushing the research to focus on self relaying way of authentication without any additional support. The issue of self relaying authentication (likes of password, combination of image clicks, etc..) is not been optimized and not been enough dynamic to provide better security. The proposed work, Math Based Approach (MBA) will improve the dynamic behaviour of password and optimize to provide better security by comparing the state of the art techniques. The Math Based Approach (MBA) will bring the attempts required to break the password in presence of eaves dropping attack with the permutation value equal to O (7810). The result is proved by a mathematical way and which is compared with 6 best existing state-of-the-art mechanisms like Challenge Based Password (CBP), Dynamic Password Protocol (DPP), Dynamic Pattern Image (DPI), Dynamic Array Pin (DAP), PicassoPass (PP) and Bag of Password (BP).

Downloads

Download data is not yet available.

References

Balajee RM, MK JK. Performance Analysis of Bag of Password Authentication using Python, Java and PHP Implementation. In2021 6th International Conference on Communication and Electronics Systems (ICCES) 2021 Jul 8 (pp. 1032-1039). IEEE.

R.M. Balajee, H. Mohapatra, K. Venkatesh, A comparative study on efficient cloud security, services, simulators, load balancing, resource scheduling and storage mechanisms. IOP Conf. Ser. Mater. Sci. Eng. 1070(1), 012053 (2021)

Balajee RM, Jayanthi Kannan MK, Murali Mohan V. Image-Based Authentication Security Improvement by Randomized Selection Approach. InInventive Computation and Information Technologies 2022 (pp. 61-71). Springer, Singapore.

Van Eekelen W, van den Elst J, Khan VJ. Dynamic layering graphical elements for graphical password schemes. Creating the Difference. 2014 Apr 3;65.

Chabbi S, Boudour R, Semchedine F, Chefrour D. Dynamic array PIN: A novel approach to secure NFC electronic payment between ATM and smartphone. Information Security Journal: A Global Perspective. 2020 Nov 1;29(6):327-40.

L. Voleti, R.M. Balajee, S.K. Vallepu, K. Bayoju, D. Srinivas, A secure image steganography using improved LSB technique and Vigenere cipher algorithm, in 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS) (IEEE, 2021 Mar 25), pp. 1005–1010

Channabasava H, Kanthimathi S. Dynamic password protocol for user authentication. InIntelligent Computing-Proceedings of the Computing Conference 2019 Jul 16 (pp. 597-611). Springer, Cham.

Fatima R, Siddiqui N, Sarosh Umar M, Khan MH. A novel text-based user authentication scheme using pseudo-dynamic password. InInformation and Communication Technology for Competitive Strategies 2019 (pp. 177-186). Springer, Singapore.

Alalayah KM. Pattern Image based Dynamic Framework for Security in Web Application. International Journal. 2021 Mar;10(2).

M.K. Rao, S.G. Santhi, M.A. Hussain, Multi factor user authentication mechanism using internet of things, in Proceedings of the Third International Conference on Advanced Informatics for Computing Research, 2019 Jun 15, pp. 1–5

K.R. Ramya, B.M. Josephine, K.D. Praveen, M.B. Maruthi, C.S. Kumar, An efficient and secured biometric authentication for IoT. Int. J. Emerging Trends Eng. Res. 7(11), 604–609 (2019)

S. Nalajala, B. Moukthika, M. Kaivalya, K. Samyuktha, N.L. Pratap, Data Security in cloud computing using three-factor authentication, in International Conference on Communication, Computing and Electronics Systems (Springer, Singapore, 2020), pp. 343–354

A. Roy, S. Razia, N. Parveen, A.S. Rao, S.R. Nayak, R.C. Poonia, Fuzzy rule based intelligent system for user authentication based on user behaviour. J. Discr. Math. Sci. Cryptogr. 23(2), 409–417 (2020)

G.K. Chaitanya, K. Raja Sekhar, Verification of pattern unlock and gait behavioural authentication through a machine learning approach. Int. J. Intell. Unmanned Syst. 2021

M.K. Rao, S.G. Santhi, M.A. Hussain, Spin wheel based graphical password authentication resistant to peeping attack. Int. J. Eng. Technol. 7(2.7), 984–987 (2018)

P. Saranya, S. Sharavanan, R. Vijai, R.M. Balajee, Authentication scheme for session passwords using color and image. Int. J. Smart Sensing Intell. Syst. 15, 10 (2017)

A. Tarannum, Z.U. Rahman, L.K. Rao, T. Srinivasulu, A. Lay-Ekuakille, An efficient multimodal biometric sensing and authentication framework for distributed applications. IEEE Sens. J. 20(24), 15014–15025 (2020)

Monisha, K., Rajasekhara Babu, M. (2019). A Novel Framework for Healthcare Monitoring System Through Cyber-Physical System. In: Internet of Things and Personalized Healthcare Systems. Springer Briefs in Applied Sciences and Technology(). Springer, Singapore, (pp. 21–36).

S. Komatineni, G. Lingala, Secured E-voting system using two-factor biometric authentication, in 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) (IEEE, 2020 Mar 11), pp. 245–248

K. Neeraja, P.R. Rao, D.S. Maloji, D.M. Hussain, Implementation of security system for bank using open CV and RFID. Int. J. Eng. Technol. 7(2–7), 187 (2018)

P.L. Kumari, G.S. Sekhar, Key exchange and E-mail authentication using lagrange interpolation, in Data Engineering and Communication Technology (Springer, Singapore, 2020), pp. 253–264

https://timesofindia.indiatimes.com/business/india-business/over-9-lakh-incidents-of-phishing-otp-compromise-reported-in-last-two-years-42-indians-have-experienced-financial-fraud/articleshow/93361388.cms, News, Times of India Web Page, Referred on 2023 Aug 22.

Marco KM. Facial Recognition Authentication Adds an Extra Layer of Security to Mobile Banking Systems. Journal of Applied Technology and Innovation (e-ISSN: 2600-7304). 2023;7(1):33.

Aparicio A, Martínez-González MM, Cardeñoso-Payo V. App-based detection of vulnerable implementations of OTP SMS APIs in the banking sector. Wireless Networks. 2023 Jul 22:1-4.

Berrios J, Mosher E, Benzo S, Grajeda C, Baggili I. Factorizing 2FA: Forensic analysis of two-factor authentication applications. Forensic Science International: Digital Investigation. 2023 Jul 1;45:301569.

Suresh, K., RajasekharaBabu, M., & Patan, R. (2016, October). EEIoT: Energy efficient mechanism to leverage the Internet of Things (IoT). In 2016 International Conference on Emerging Technological Trends (ICETT) (pp. 1-4). IEEE.

Downloads

Published

24.03.2024

How to Cite

Suresh Kallam , M K Jayanthi Kannan , B. R. M. , . (2024). A Novel Authentication Mechanism with Efficient Math Based Approach. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 2500–2510. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5722

Issue

Section

Research Article