Volume 15 , Issue 1 , PP: 77-88, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Balajee R. M. 1 * , Suresh Kallam 2 , M. K. Jayanthi Kannan 3
Doi: https://doi.org/10.54216/JCIM.150107
The security of any device or data on it is greatly dependent on the authentication and session handling. Using an MFA-based OTP method, the most popular web apps, such as communication mail, social media platforms, and financial transactions, manage spoofing attempts and attempt to keep them to a minimum. There is statistical evidence that indicates that between April 2020 and March 2022, this well-known OTP mechanism lost 1434.75 crore rupees, further weakening its hold on security. This unusual situation is driving research toward authentication methods that rely solely on itself without external aid. In order to improve security, self-dependent authentication methods (passwords, combinations of image clicks, etc.) have not been streamlined or made sufficiently dynamic. By comparing state-of-the-art methods, the suggested work, Mathematic Based Technique (MBT), will enhance the dynamic behaviour of passwords and optimize to give greater security. In the event of an eavesdropping assault, the Mathematic Based Technique (MBT) will make it difficult for hackers to pull the efforts to crack the password with the probability with permutation value is equal to O (7810). Mathematical proof of the result is provided, and it is compared to the six best state-of-the-art mechanisms which are now in use, those are Picasso Pass (PP) which uses layered mechanism, Dynamic Password Protocol (DPP) which uses date and time in it, Dynamic Pattern Image (DPI) which resembles mobile pattern authentication, Dynamic Array Pin (DAP) which uses area based pin or a pre-defined pin, and Bag of Password (BP) which uses image.
Self dependent Authentication , Probability with Permutation , CBP-Challenge Based Password , DPI-Dynamic Pattern Image , DPP-Dynamic Password Protocol , DAP-Dynamic Array Pin , PP-Picasso Pass and BP-Bag of Password , MBT-Mathematic Based Technique
[1] Balajee, R. M., et.al., "Authentication Improvization by the Image with Random Choice Approach." International Computation and Information Tech., ICICIT 2021. 2022. 61-71.
[2] Channabasava, H., et.al.,. Improving Authentication with DPP. Proceedings, Smart Computng Conference, 2019, Vol. 2, pp. 597-611.
[3] van Eekelen, et.al., "Dynamic password with graphical schemas", The Hague University of Appled Sciences. 2014.
[4] MK, J. K. (2021, July). Bag of Password Tech for Authentication and Analysis with Python, Java and PHP Languages. International Confrence in Communication Systems pp. 1030-1037. 2019.
[5] Boudour, R., et.al.,. DAP: A NFC payment security technique. Journal of Informtion Security: 6(29), 325-338, 2020.
[6] Sherubha, “Graph Based Event Measurement for Analyzing Distributed Anomalies in Sensor Networks”, Sådhanå(Springer), 45:212, https://doi.org/10.1007/s12046-020-01451-w
[7] Piyush K. Pareek, Pixel Level Image Fusion in Moving objection Detection and Tracking with Machine Learning “,Fusion: Practice and Applications, Volume 2 , Issue 1 , PP: 42-60, 2020
[8] Shivam Grover, Kshitij Sidana, Vanita Jain, “Egocentric Performance Capture: A Review”, Fusion: Practice and Applications, Volume 2, Issue 2 , PP: 64-73, 2020.
[9] Abdel Nasser H. Zaied, Mahmoud Ismail and Salwa El- Sayed, A Survey on Meta-heuristic Algorithms for Global Optimization Problems, Journal of Intelligent Systems and Internet of Things,Volume 1 , Issue 1 , PP: 48-60, 2020
[10] Mahmoud H.Alnamoly, Ahmed M. Alzohairy, Ibrahim M. El-Henawy, “A survey on gel images analysis software tools, Journal of Intelligent Systems and Internet of Things,Volume 1 , Issue 1 , PP: 40-47, 2021.
[11] A. Roy, et al., (2020) "Anasysing Behaviour with Fuzzy over EndUser Authentication Security." Journal of Discrete Mathematics, pp. 211 – 219, 2(21).
[12] M. Kameswara, et.al., (2018) "Graphical way with spin wheel authentication.", IJET, Vol. 7, Issue. 2, pp. 872-891.
[13] P Kumari, L S, et.al., “Authentication with lagrange interpolation by considering email”. In proceedings of International Conference on Data Engg. and Tech, 2k18, pp. 142-153.
[14] Jessica B, et al., "Two Factor Factirization based Authentication Mechanism:An Analysis Over." in Digital Investigation 35, pp. 301-320.2013.
[15] M Amador, et al., "Vulnerabilities Findings over Banking with implementation of OTP and SMS Mechanismr." Wireless Networks pp. 1-14, 2022.
[16] Mudra H, et.al., “An Article on RFID Security Protocols with IoT”, Electronics. 2023, 13(11): pp. 75-89.
[17] Sathya Preiya, V., and V. D. Ambeth Kumar. (2023). Deep Learning-Based Classification and Feature Extraction for Predicting Pathogenesis of Foot Ulcers in Patients with Diabetes. Diagnostics 13(12), 1983.
[18] Balakrishnan, Chitra, and V. D. Ambeth Kumar. (2023). IoT-Enabled Classification of Echocardiogram Images for Cardiovascular Disease Risk Prediction with Pre-Trained Recurrent Convolutional Neural Networks. Diagnostics 13(4), 775
[19] Hemamalini, Selvamani, and Visvam Devadoss Ambeth Kumar. (2022). Outlier Based Skimpy Regularization Fuzzy Clustering Algorithm for Diabetic Retinopathy Image Segmentation. Symmetry, 14(12), 2512.
[20] Ambeth Kumar, V.D. Ramakrishnan,M. (2013). Temple and Maternity Ward Security using FPRS. Journal of Electrical Engineering & Technology, 8(3), 633-637.
[21] Kumar, V.D.A., Sharmila, S., Kumar, A. et al. (2023). A novel solution for finding postpartum haemorrhage using fuzzy neural techniques. Neural Comput & Applic. 35(33), 23683–23696
[22] Kumar, V.D.A., Ruphitha, S.V., Kumar, A. et al. An effective method for predicting postpartum haemorrhage using deep learning techniques. Multimed Tools Appl (2022). https://doi.org/10.1007/s11042-021-11622-4.