E-Authentication System Using QR Code and OTP

Abstract

With the fast expansion of wireless communication technology, user authentication is becoming increasingly vital in order to assure the system's security. Passwords serve a vital part in the authentication process. The user's password will be submitted with the traffic to the authentication server during the authentication procedure, allowing the server to provide access to the authorized user. The invaders will take advantage of the opportunity to try to sniff out other people's passwords in order to carry out illicit acts under the guise of someone else's identity, keeping them out of danger. Many methods have been offered to improve the security of wireless communication technologies as a result of the challenges. The recommended approach will be utilized to improve the system's security in this study. One-time passwords, hashing, and two-factor authentication were chosen as the solution. There will also be a new solution that uses the QR code to assist preserve more data. The system outcome's goal is to improve the present login authentication mechanism. It proposes ways to make password cracking more difficult, as well as persuade people to pick and use tough-to-guess passwords.

Country : Saudi Arabia

1 Mohammed Awad Mohammed Ataelfadiel

  1. Department of Computer Science and Information, College of Sharia and Islamic Studies at Al-Ahsa, Imam Muhammad bin Saud Islamic University (IMSIU), Saudi Arabia & College of Computer Science and Information, Open University of the Sudan, Sudan

IRJIET, Volume 6, Issue 9, September 2022 pp. 75-81

doi.org/10.47001/IRJIET/2022.609012

References

  1. Tiwari, S. (2016, December). An introduction to QR code technology. In 2016 international conference on information technology (ICIT) (pp. 39-44). IEEE.
  2. Sharma, M. K., & Nene, M. J. (2020). Dual factor thirdparty biometricbased authentication scheme using quantum one-time passwords. Security and Privacy, 3(6), e129.
  3. Saranya, K., Reminaa, R. S., &Subhitsha, S. (2016, March). Modern applications of QR-Code for security. In 2016 IEEE International Conference on Engineering and Technology (ICETECH) (pp. 173-177). IEEE.
  4. Karim, N. A., &Shukur, Z. (2016). Proposed features of an online examination interface design and its optimal values. Computers inHuman Behavior, 64, 414–422. https://doi.org/10.1016/j.chb.2016.07.013.
  5. Alexandre, B., Reynaud, E., Osiurak, F., & Navarro, J. (2018). Acceptance and acceptability criteria: A literature review. Cognition, Technology & Work, 20(2), 165– 177. https://doi.org/10.1007/s10111-018-0459-1.
  6. Karim, N. A., &Shukur, Z. (2015). Review of user authentication methods in online examination. Asian Journal of Information Technology, 14(5), 166–175.
  7. Edwards, C., Holmes, W., Whitelock, D., & Okada, A. (2018). Student trust in e-authentication. In Proceedings of the Fifth Annual ACM Conference on Learning at Scale, UK, Article No.: 42, 1–4. https://doi.org/10.1145/3231644.3231700.
  8. Moini, A., &Madni, A. M. (2009). Leveraging biometrics for user authentication in online learning: A systems perspective. IEEE Systems Journal, 3(4), 469–476. https://doi.org/10.1109/JSYST.2009.2038957.
  9. Jain, A. K., Ross, A., &Prabhakar, S. (2004). An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1), 4–20. https://doi.org/10.1109/TCSVT.2003.818349.
  10. Okada, A., Whitelock, D., Holmes, W., & Edwards, C. (2019). E-authentication for online assessment: A mixed-method study. British Journal of Educational Technology, 50(2), 861–875. https://doi.org/10.1111/bjet.12608.
  11. TeSLA. (2016). The TeSLA project home page. https://tesla-project.eu/. Accessed 18 Feb 2018.
  12. Srivastava, S., &Sivasankar, M. (2016, August). On the generation of alphanumeric one time passwords. In 2016 International Conference on Inventive Computation Technologies (ICICT) (Vol. 1, pp. 1-3). IEEE.