Back
 CN  Vol.9 No.3 , August 2017
Enhancing Multi-Factor Authentication in Modern Computing
Abstract: Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like snooping, sniffing, spoofing and phishing. There is need to curb these problems with the use of an enhanced multi-factor authentication approach. The objective of this work is to create a multi-factor authentication software for a 4G wireless network. Multi-factor authentication involves user’s knowledge factor, user’s possession factor and user’s inherence factor; that is who the user is to be presented before system access can be granted. The research methodologies used for this work include Structured System Analysis and Design Methodology, SSADM and Prototyping. The result of this work will be a Multi-factor authentications software. This software was designed with programming languages like ASP. NET, C# and Microsoft SQL Server for the database.
Cite this paper: Nwabueze, E. , Obioha, I. and Onuoha, O. (2017) Enhancing Multi-Factor Authentication in Modern Computing. Communications and Network, 9, 172-178. doi: 10.4236/cn.2017.93012.
References

[1]   Adam, B. (2014) Biometrics for Identification and Authentication. Eprint Publishers, Westpoint, USA.

[2]   Brian, K. (2006) Security Fix—Citibank Phish Spoofs 2-Factor Authentication. Washington Post Press, Washington, USA.

[3]   Bruce, S. (2005) The Failure of Two-Factor Authentication. Schneier Publishers, New York, USA.

[4]   DeBorde, D. (2012) Two-Factor Authentication Exposed. Goldman Publishers, New York, USA.

[5]   Howard, S. (2016) How Web Sniffing Works. Bellingcat Press, New York, USA.

[6]   Hangman, G. (2016) All about iCloud Technology. Kinjo Press, Minnesota, USA.

[7]   Mann, J. (2016) Mobile Two Factor Authentication. Pcisecurity Publishers, London, GB.

[8]   Tim, K. (2015) The Failure of Two-Factor Authentication. Kinjo Press, Minnesota, USA.

[9]   Rosenblatt, S. and Cipriani, J. (2015) Two-Factor Authentication: What You Need to Know (FAQ). Retrieved from
https://www.cnet.com/

[10]   Syracuse, F. (2013) Secure Configurations for Network Devices. WestPoint Printers, Virginia, USA.

[11]   Sean, A. (2016) Usable Two-Factor Authentication Based on Ambient Sound. Usenix Publishers, New York, USA.

[12]   Thomas, J. (2015) Two-Factor Authentication: All You Need to Know. CNET Press, Ohio, USA.

[13]   Van, T., Henk, C. and Jajodia, S. (2011) Encyclopedia of Cryptography and Security. Volume 1, Springer Science & Business Media, New York, USA.

 
 
Top