Abstract

Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like snooping, sniffing, spoofing and phishing. There is need to curb these problems with the use of an enhanced multi-factor authentication approach. The objective of this work is to create a multi-factor authentication software for a 4G wireless network. Multi-factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted. The research methodologies used for this work include Structured System Analysis and Design Methodology, SSADM and Prototyping. The result of this work will be a Multi-factor authentications software. This software was designed with programming languages like ASP. NET, C# and Microsoft SQL Server for the database.

Highlights

  • IntroductionMulti-factor authentication (MFA) is a method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism-typically at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are)

  • Multi-factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted

  • Enhanced multi-factor authentication involves the requirement of the user to present at least three of different authentication factors before access can be granted to the resource sought for

Read more

Summary

Introduction

Multi-factor authentication (MFA) is a method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism-typically at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Enhanced multi-factor authentication requires that the user must present knowledge factor or factors like passwords or PIN, possession factor or factors like SIM card or ATM card and an inherence factor or factors like fingerprint, iris color or voice tone; before he/she is granted access to the system. The authentication factors of a multi-factor authentication scheme may include: 1) Some physical object in the possession of the user, such as a USB stick with a secret token, a bank card or a SIM-subscriber identification module. Many multi-factor authentication techniques rely on password as one factor of authentication Variations include both longer ones formed from multiple words (a passphrase) and the shorter, purely numeric, personal identification number (PIN) commonly used for ATM access. Security of the mobile-delivered security tokens fully depends on the mobile operator’s operational security and can be breached by wiretapping or SIM cloning by national security agencies

Theoretical Framework
Roles of Enhanced Multi-Factor Authentication in Modern Computing
Considerations in Enhanced Multi-Factor Authentication Implementation
Summary
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.