Skip to main content

Review of Various Two-Phase Authentication Mechanisms on Ease of Use and Security Enhancement Parameters

  • Conference paper
  • First Online:
Social Networking and Computational Intelligence

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 100))

  • 726 Accesses

Abstract

We are living in a digital era, where most of the critical information whether it is confidential, academic documents or chats and even money transaction is being done in digital format. Digital technology is progressing at its large because of its ease and speed. With this digital data advancement, responsibility and core need arises for its security arises. For protecting data, authentication mechanism plays a major role. Authentication mechanism assures security of data by allowing legitimate users to access it. Using single-phase authentication mechanism (UID and password) is the easiest and convenient mechanism to implement and use in past days. For preserving data from false access, there is a need to develop more protected authentication mechanism which cannot be easily penetrated. This gave birth to two-phase authentication mechanisms that are commonly known as two-factor authentication mechanisms. Two-phase authentication mechanisms provide additional security by adding one more factor for authentication in traditional single-phase authentication mechanisms. There are lots of two-phase authentication mechanisms that developed with technological advancement. In this paper, we will review various two-phase authentication mechanisms by considering security enhancement they provide and ease of use in their implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. https://searchsecurity.techtarget.com/definition/authentication

  2. Umanandhini D, TamilSelvan T, Udhayakumar S, Vijayasingam T (2012) Dynamic authentication for consumer supplies in mobile cloud environment. In: IEEE conference at ICCCNT’12. Coimbatore, India

    Google Scholar 

  3. Sabri HM, Ghany KKA, Hefny HA, Elkhameesy N (2014) Biometrics template security on cloud computing. At 978-1-4799-3080-7/14/$31.00 @ 2014. IEEE

    Google Scholar 

  4. Impedovo D, Pirlo G, Russo M (2014) Recent advances in offline signature identification. In: IEEE 2014 14th international conference on frontiers in handwriting recognition

    Google Scholar 

  5. Velciu MA, Pătraşcu A, Patriciu VV (2014) Bio-cryptographic authentication in cloud storage sharing. In: 9th IEEE international symposium on applied computational intelligence and informatics. Timişoara, Romania, pp 15–17

    Google Scholar 

  6. Li X, Sun X, Liu Q (2015) Image integrity authentication scheme based on fixed point theory. IEEE Trans Image Process 24(2)

    Google Scholar 

  7. Nugroho H, Al-Absi HRH, Shan LP (2018) Iris recognition for authentication: development on a lighter computing platform. In: IEEE 978-1-5386-8369-9/18/$31.00 ©2018

    Google Scholar 

  8. Naik R, Singh DP, Choudhary J (2018) A survey on comparative analysis of different ICA based face recognition technologies. In: Proceedings of the 2nd international conference on electronics, communication and aerospace technology (ICECA 2018). IEEE Conference Record #42487; IEEE Xplore ISBN: 978-1-5386-0965-1

    Google Scholar 

  9. Monisha SJ, Sheeba GM (2018) Gait based authentication with hog feature extraction. IEEE 978-1-5386-1974-2/18/$31.00 ©2018

    Google Scholar 

  10. Tsigie MW, Thakare R, Joshi R (2018) Face recognition techniques based on 2D local binary pattern, histogram of oriented gradient and multiclass support vector machines for secure document authentication. In: Proceedings of the 2nd international conference on inventive communication and computational technologies (ICICCT 2018). IEEE Xplore compliant—part number: CFP18BAC-ART; ISBN: 978-1-5386-1974-2

    Google Scholar 

  11. Sethia D, Gupta D, Saran H (2018) NFC secure element-based mutual authentication and attestation for IoT access. J Trans Consum Electron 14(8). https://doi.org/10.1109/tce.2018.2873181. IEEE, transactions on consumer electronics

    Article  Google Scholar 

  12. Anand SA, Saxena N (2018) Noisy vibrational pairing of IoT devices. https://doi.org/10.1109/tdsc.2018.2873372, IEEE

    Article  Google Scholar 

  13. Merhav N (2018) Ensemble performance of biometric authentication systems based on secret key generation. https://doi.org/10.1109/tit.2018.2873132, IEEE

    Article  MathSciNet  Google Scholar 

  14. Choi J (2018) A coding approach with key-channel randomization for physical-layer authentication. https://doi.org/10.1109/tifs.2018.2847659, IEEE

    Article  Google Scholar 

Download references

Acknowledgements

I am highly thankful to my guide Dr. Anand Rajavat (Head of Department of Computer Science). His suggestion and interest have helped me in integrating the work. His accommodating nature tolerates my persistent queries and provided the best solution to my problem. I am also thankful to Department of Computer Science for providing all facilities and resources needed for this research paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Himani Thakur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thakur, H., Rajavat, A. (2020). Review of Various Two-Phase Authentication Mechanisms on Ease of Use and Security Enhancement Parameters. In: Shukla, R., Agrawal, J., Sharma, S., Chaudhari, N., Shukla, K. (eds) Social Networking and Computational Intelligence. Lecture Notes in Networks and Systems, vol 100. Springer, Singapore. https://doi.org/10.1007/978-981-15-2071-6_55

Download citation

Publish with us

Policies and ethics