Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.9.45

Improved Multi-layer Authentication Scheme by Merging One-time Password with Voice Biometric Factor  

ALRUWAILI, Amal (Department of computer Science, College of Computer and Information Sciences, Jouf University)
Hendaoui, Saloua (Department of computer Science, College of Computer and Information Sciences, Jouf University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.9, 2021 , pp. 346-353 More about this Journal
Abstract
In this proposal, we aim to enhance the security of systems accounts by improving the authentication techniques. We mainly intend to enhance the accuracy of the one-time passwords via including voice biometric and recognition techniques. The recognition will be performed on the server to avoid redirecting voice signatures by hackers. Further, to enhance the privacy of data and to ensure that the active user is legitimate, we propose to periodically update the activated sessions using a user-selected biometric factor. Finally, we recommend adding a pre-transaction re-authentication which will guarantee enhanced security for sensitive operations. The main novelty of this proposal is the use of the voice factor in the verification of the one-time password and the various levels of authentications for a full-security guarantee. The improvement provided by this proposal is mainly designed for sensitive applications. From conducted simulations, findings prove the efficiency of the proposed scheme in reducing the probability of hacking users' sessions.
Keywords
cybersecurity; authentication; password; biometric; voice; recognition; three levels;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Is your OTP safe? Here is how hackers are redirecting your SMS. https://www.businesstoday.in/latest/trends/is-your-otp-safe-here-is-how-hackers-are-redirecting- your-sms/story/433994.html. Date accessed: 06-13-2021
2 Alston, A. (2021). A new era in cybersecurity through biometric technology (Order No. 28494739). Available from ProQuest Dissertations & Theses Global. (2537678931). Retrieved from https://www.proquest.com/dissertations-theses/new-era-cybersecurity-through-biometric/docview/2537678931/se-2?accountid=34495
3 Mishra, Gouri & Mishra, Pradeep & Nand, Parma & Astya, Rani & ., Amrita. (2020). User Authentication: A Three Level Password Authentication Mechanism. Journal of Physics: Conference Series. 1712. 012005. 10.1088/1742-6596/1712/1/012005.   DOI
4 Federico Sinigaglia, Roberto Carbone, Gabriele Costa, Nicola Zannone, A survey on multi- factor authentication for online banking in the wild, Computers & Security, Volume 95, 2020, 101745, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101745.   DOI
5 Tabassum M., Sarower A.H., Esha A., Hassan M.M. (2020) An Enhancement of Kerberos Using Biometric Template and Steganography. In: Bhuiyan T., Rahman M.M., Ali M.A. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 325. Springer, Cham. https://doi.org/10.1007/978-3-030-52856-0_9   DOI
6 B Poornima, Dr. Savadam Balaji. (2021). Cyber Security for Atm Terminals. Annals of the Romanian Society for Cell Biology, 8785-8789. Retrieved from https://www.annalsofrscb.ro/index.php/journal/article/view/3599
7 Fatma Hendaoui, Hamdi Eltaief, Habib Youssef, UAP: A unified authentication platform for IoT environment, Computer Networks, Volume 188, 2021, 107811, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2021.107811.   DOI
8 Das, S. (2020). A risk-reduction-based incentivization model for human-centered multifactor authentication (Doctoral dissertation, Indiana University). https://www.proquest.com/openview/38faf90785cf47c997333c8a799e1e83/1?pq-origsite=gscholar&cbl=18750&diss=y
9 Ometov A, Bezzateev S, Makitalo N, Andreev S, Mikkonen T, Koucheryavy Y. Multi-Factor Authentication: A Survey. Cryptography. 2018 Jan 5;2(1). https://doi.org/10.3390/cryptography2010001   DOI
10 Supeshala, Chamidu. (2017). Speaker Recognition using Voice Biometrics. https://www.researchgate.net/publication/344349873_Speaker_Recognition_using_Voice_BiometricsFigures
11 Stamp, M. (2011). Information security: principles and practice. John Wiley & Sons. ISBN: 978-1-118-02796-7, https://www.wiley.com/ens/Information+Security%3A+Principles+and+Practice%2C+2nd+Edition-p-9781118027967
12 Patel C., Doshi N. (2019) Security Challenges in IoT Cyber World. In: Hassanien A., Elhoseny M., Ahmed S., Singh A. (eds) Security in Smart Cities: Models, Applications, and Challenges. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-01560-2_8   DOI