Access to Network Login by Three-Factor Authentication for Effective Information Security

Today’s technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping mone...

Full description

Saved in:
Bibliographic Details
Main Authors: S. Vaithyasubramanian, A. Christy, D. Saravanan
Format: Article
Language:English
Published: Wiley 2016-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2016/6105053
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832552996086480896
author S. Vaithyasubramanian
A. Christy
D. Saravanan
author_facet S. Vaithyasubramanian
A. Christy
D. Saravanan
author_sort S. Vaithyasubramanian
collection DOAJ
description Today’s technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security.
format Article
id doaj-art-92f30363ef894bffaa078e577fbc439d
institution Kabale University
issn 2356-6140
1537-744X
language English
publishDate 2016-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-92f30363ef894bffaa078e577fbc439d2025-02-03T05:57:21ZengWileyThe Scientific World Journal2356-61401537-744X2016-01-01201610.1155/2016/61050536105053Access to Network Login by Three-Factor Authentication for Effective Information SecurityS. Vaithyasubramanian0A. Christy1D. Saravanan2Research Scholar, Sathyabama University, Chennai 600119, IndiaResearch Supervisor, Sathyabama University, Chennai 600119, IndiaFaculty of Operations & Systems, IBS, Hyderabad 501203, IndiaToday’s technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security.http://dx.doi.org/10.1155/2016/6105053
spellingShingle S. Vaithyasubramanian
A. Christy
D. Saravanan
Access to Network Login by Three-Factor Authentication for Effective Information Security
The Scientific World Journal
title Access to Network Login by Three-Factor Authentication for Effective Information Security
title_full Access to Network Login by Three-Factor Authentication for Effective Information Security
title_fullStr Access to Network Login by Three-Factor Authentication for Effective Information Security
title_full_unstemmed Access to Network Login by Three-Factor Authentication for Effective Information Security
title_short Access to Network Login by Three-Factor Authentication for Effective Information Security
title_sort access to network login by three factor authentication for effective information security
url http://dx.doi.org/10.1155/2016/6105053
work_keys_str_mv AT svaithyasubramanian accesstonetworkloginbythreefactorauthenticationforeffectiveinformationsecurity
AT achristy accesstonetworkloginbythreefactorauthenticationforeffectiveinformationsecurity
AT dsaravanan accesstonetworkloginbythreefactorauthenticationforeffectiveinformationsecurity