Introduction and Limitation of 2 Wmas
Exploring and Implementing Two-Factor Authentication
Keywords:
static ID, password authentication system, two factor authentication, implementation issues, authentication techniqueAbstract
Even though manyorganizations still rely on static ID and password authentication system, thismethod is getting old and there is a requirement for a better way ofauthentication which is required. One of the solutions for this issue is thetwo factor authentication technique as a fundamental security function. Ourdissertation proposal explores the two factor authentication technique andimplementation issues which can be used for the two factor authenticationtechnique. We implement Two-factor authentication method in two main phases. Inthe first phase, the authenticator gets a request generated by the applicationto authenticate a specified user. When the request is received, it generates aone-time password and sends it through a SMS to a GSM cell phone registered forthat specified user.Downloads
Download data is not yet available.
Published
2012-08-01
Issue
Section
Articles