Abstract
We are living in a digital era, where most of the critical information whether it is confidential, academic documents or chats and even money transaction is being done in digital format. Digital technology is progressing at its large because of its ease and speed. With this digital data advancement, responsibility and core need arises for its security arises. For protecting data, authentication mechanism plays a major role. Authentication mechanism assures security of data by allowing legitimate users to access it. Using single-phase authentication mechanism (UID and password) is the easiest and convenient mechanism to implement and use in past days. For preserving data from false access, there is a need to develop more protected authentication mechanism which cannot be easily penetrated. This gave birth to two-phase authentication mechanisms that are commonly known as two-factor authentication mechanisms. Two-phase authentication mechanisms provide additional security by adding one more factor for authentication in traditional single-phase authentication mechanisms. There are lots of two-phase authentication mechanisms that developed with technological advancement. In this paper, we will review various two-phase authentication mechanisms by considering security enhancement they provide and ease of use in their implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
https://searchsecurity.techtarget.com/definition/authentication
Umanandhini D, TamilSelvan T, Udhayakumar S, Vijayasingam T (2012) Dynamic authentication for consumer supplies in mobile cloud environment. In: IEEE conference at ICCCNT’12. Coimbatore, India
Sabri HM, Ghany KKA, Hefny HA, Elkhameesy N (2014) Biometrics template security on cloud computing. At 978-1-4799-3080-7/14/$31.00 @ 2014. IEEE
Impedovo D, Pirlo G, Russo M (2014) Recent advances in offline signature identification. In: IEEE 2014 14th international conference on frontiers in handwriting recognition
Velciu MA, Pătraşcu A, Patriciu VV (2014) Bio-cryptographic authentication in cloud storage sharing. In: 9th IEEE international symposium on applied computational intelligence and informatics. Timişoara, Romania, pp 15–17
Li X, Sun X, Liu Q (2015) Image integrity authentication scheme based on fixed point theory. IEEE Trans Image Process 24(2)
Nugroho H, Al-Absi HRH, Shan LP (2018) Iris recognition for authentication: development on a lighter computing platform. In: IEEE 978-1-5386-8369-9/18/$31.00 ©2018
Naik R, Singh DP, Choudhary J (2018) A survey on comparative analysis of different ICA based face recognition technologies. In: Proceedings of the 2nd international conference on electronics, communication and aerospace technology (ICECA 2018). IEEE Conference Record #42487; IEEE Xplore ISBN: 978-1-5386-0965-1
Monisha SJ, Sheeba GM (2018) Gait based authentication with hog feature extraction. IEEE 978-1-5386-1974-2/18/$31.00 ©2018
Tsigie MW, Thakare R, Joshi R (2018) Face recognition techniques based on 2D local binary pattern, histogram of oriented gradient and multiclass support vector machines for secure document authentication. In: Proceedings of the 2nd international conference on inventive communication and computational technologies (ICICCT 2018). IEEE Xplore compliant—part number: CFP18BAC-ART; ISBN: 978-1-5386-1974-2
Sethia D, Gupta D, Saran H (2018) NFC secure element-based mutual authentication and attestation for IoT access. J Trans Consum Electron 14(8). https://doi.org/10.1109/tce.2018.2873181. IEEE, transactions on consumer electronics
Anand SA, Saxena N (2018) Noisy vibrational pairing of IoT devices. https://doi.org/10.1109/tdsc.2018.2873372, IEEE
Merhav N (2018) Ensemble performance of biometric authentication systems based on secret key generation. https://doi.org/10.1109/tit.2018.2873132, IEEE
Choi J (2018) A coding approach with key-channel randomization for physical-layer authentication. https://doi.org/10.1109/tifs.2018.2847659, IEEE
Acknowledgements
I am highly thankful to my guide Dr. Anand Rajavat (Head of Department of Computer Science). His suggestion and interest have helped me in integrating the work. His accommodating nature tolerates my persistent queries and provided the best solution to my problem. I am also thankful to Department of Computer Science for providing all facilities and resources needed for this research paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Thakur, H., Rajavat, A. (2020). Review of Various Two-Phase Authentication Mechanisms on Ease of Use and Security Enhancement Parameters. In: Shukla, R., Agrawal, J., Sharma, S., Chaudhari, N., Shukla, K. (eds) Social Networking and Computational Intelligence. Lecture Notes in Networks and Systems, vol 100. Springer, Singapore. https://doi.org/10.1007/978-981-15-2071-6_55
Download citation
DOI: https://doi.org/10.1007/978-981-15-2071-6_55
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2070-9
Online ISBN: 978-981-15-2071-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)