Task Solutions-Authentication System Using QR Code and OTP CIT111

Task Solutions-Authentication System Using QR Code and OTP CIT111

1 INFORMATION SYSTEM
INFORMATION SYSTEM: AUTHENTICATION SYSTEM USING QR CODE & OTP
FOR PHYSICAL SECURITY
Submitted by:
Submitted to:
Author note: …

Preview text

1 INFORMATION SYSTEM
INFORMATION SYSTEM: AUTHENTICATION SYSTEM USING QR CODE & OTP
FOR PHYSICAL SECURITY
Submitted by:
Submitted to:
Author note:
2 INFORMATION SYSTEM
Table of Contents
Introduction ……………………………………………………………………………………………………………… 3
Background ………………………………………………………………………………………………………… 3
Aim and objective ……………………………………………………………………………………………….. 3
Research questions ………………………………………………………………………………………………. 4
Planned steps to complete the research …………………………………………………………………… 4
Research methodology ………………………………………………………………………………………………. 5
Expected outcome …………………………………………………………………………………………………….. 6
References ……………………………………………………………………………………………………………….. 7
3 INFORMATION SYSTEM
Introduction
Background
Security is critical while accessing services in aweb context, particularly for both the
provider and the consumer (1, 2). The data in use should be managed in such away that its
safety is not jeopardized. Passwords are only safe in case they are kept secret by the user. Not
everyone understands the dangers of exposed credentials as well as other data leaks;
especially technologically unsound persons. Client-side assaults or core vulnerabilities
against different applications such as online banking and e-commerce have recently increased
because of alack of security awareness among end users. As aresult, the end-user would be
unaware if their computer or system had avulnerability that could lead to aclient-side attack
(3). The passwords is still the most often used authentication method in current times. The
online user is required to submit his or her credentials into an online system in order to
complete any browser business exchange. The demand for more advanced security measures
for security parameters in both offline and online environment grows, as technology
improvements tend to influence how society pays for products and services (4, 5). Therefore,
several issues tend to occur in various areas related to physical security that needs to be
resolved with proper authentication factor.
Aim and objective
The underlying aim of the study is to create an authentication system that will be
using One Time Password (OTP) as well as QR code that can be used by various
organizations to secure their physical security improvement process. The objectives that will
further drive the study can be defined as follows:
ï‚· To evaluate the requirement of multi-factor authentication for secure transaction
4 INFORMATION SYSTEM
ï‚· To synthesize existing challenges associated with secure monetary transaction and
data transmission
ï‚· To develop the multifactor authentication system with QR and OTP based
authentication process for recommending the best-suited option for strategic
development
Research questions
The research questions that will further help to accelerate the study are as follows:
ï‚· How multi-factor authentication can be used for secure transaction?
ï‚· What are the existing challenges associated with secure monetary transaction and data
transmission?
ï‚· How development of the multifactor authentication system with QR and OTP can
based authentication process help to mitigate the challenges?
Planned steps to complete the research
The overall research process will be divided into five main chapters. In the
introductory chapter, the current problem and the significance of the study will be derived to
understand how the planned method can assist to resolve those issues. In order to further
strengthen the study, empirical research on the discussing factor of authentication
requirements, challenges as well as current growth in research will be provided in the next
chapter. The third chapter of the research will be dedicated to defining the underlying
methodology applied for creating the authentication system and analyzing further limitations
of the study. Moreover, the fourth chapter will shed light on the process developed as well as
its demonstration with proper illustrations. The final segment of the study will conclude on
the overall findings and further improvement ideas through suggestions before stating future
work possibilities.
5 INFORMATION SYSTEM
Research methodology
The term research methodology can be contemplated as an outline of how agiven
piece of research can be carried out (6). Additionally, it effectively defines the procedures or
techniques that are used for identifying as well as analyses information regarding aspecific
research topic. Likewise, in this particular context, an exploratory research approach will be
undertaken to develop anew combination of multi-factor authentication. Exploratory study
can be defined as the underlying process of clarifying the exact nature of the problem that
needs to be resolved (7). As this study tends to focuses on exploring how the planned process
of authentication system use can help individuals well as organizations in terms of physical
security, the mentioned idea of exploratory qualitative analysis seems the best-suited one.
The main idea of the study is to design aproper authentication system. In order to
implement the process, the following steps will be taken into account:
ï‚· Step 1: Creating aprofile for receiving QR code when atransaction is initiated from a
user ’send
ï‚· Step 2: Using the QR code for logging into the process and inserting OTP sent to the
registered mobile numbers
ï‚· Step 3: Asking random question based on the profile information, giving two attempts
for each questions, and in case the first verification question is wrongly answered,
providing new question. For example, entering last name, maiden name, birth month
or any specific security questions can be asked in this context. In case all questions
are wrongly answered proceeding to the next step
ï‚· Step 4: Sending verification e-mail to the registered mail id, if accessed through the
link, provide authentication, in case not accessed through e-mail blocking the account
6 INFORMATION SYSTEM
ï‚· Step 6: Sending e-mail to set a new QR code to the person. In case denied or
unanswered, the account will be blocked
Expected outcome
Upon completion of the planned research, aclear amulti-factor authentication system
that combines QR code and OTP will be developed. The six-step approach planned for the
discussing area, would predominantly help in terms of improving the authentication and
further help individuals to get protected against the rising cybersecurity threats in current
times. Moreover, scope of improving the underlying process of physical security by
combining different authentication factors can be essentially done with the help of the
discussing context after successful completion of this study.
7 INFORMATION SYSTEM
References
1. Vegh L. Cyber-physical systems security through multi-factor authentication and data
analytics. In2018 IEEE International Conference on Industrial Technology (ICIT) 2018
Feb 20 (pp. 1369-1374). IEEE.
2. Nimmy K, Sankaran S, Achuthan K. A novel multi-factor authentication protocol for
smart home environments. InInternational Conference on Information Systems Security
2018 Dec 17 (pp. 44-63). Springer, Cham.
3. Noura HN, Melki R, Chehab A. Secure and lightweight mutual multi-factor authentication
for IoT communication systems. In2019 IEEE 90th Vehicular Technology Conference
(VTC2019-Fall) 2019 Sep 22 (pp. 1-7). IEEE.
4. Ibrokhimov S, Hui KL, Al-Absi AA, Sain M. Multi-factor authentication in cyber physical
system: a state of art survey. In2019 21st international conference on advanced
communication technology (ICACT) 2019 Feb 17 (pp. 279-284). IEEE.
5. Ometov A, Bezzateev S, M äkitalo N, Andreev S, Mikkonen T, Koucheryavy Y. Multi-
factor authentication: A survey. Cryptography. 2018 Mar;2(1):1.
6. Mohajan HK. Qualitative research methodology in social sciences and related subjects.
Journal of Economic Development, Environment and People. 2018;7(1):23-48.
7. Dźwigo łH, Dźwigo ł-Barosz M. Scientific research methodology in management sciences.
Financial and credit activity problems of theory and practice. 2018 Jun 29;2(25):424-37.

Order Now

QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER