Authentication System For Enterprise Security
Authentication System For Enterprise Security
[Link]
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at [Link]
Abstract: Authentication plays a central role in boosting an organization’s security posture. It helps enable an organization to keep its
systems secure by permitting only authenticated users (or processes) to access the protected resources, such as computer systems,
networks, databases, websites, and other network-based applications or services. Passwords are the more traditional form of
authentication, but they constitute a weak form of protection; users are prone to bad password practices, such as reusing passwords,
using predictable passwords, or even sharing passwords with others. To combat this issue, more companies are leveraging artificial
intelligence (AI) and machine learning (ML) technologies, such as deep learning-based techniques, to develop better and more secure
authentication approaches. AI/ML algorithms have been shown to bolster cybersecurity by protecting devices against cyber-attacks
and preventing fraudulent activities. In this blog post, we introduce an AI solution based on deep learning and computer vision to
perform face recognition-based biometrical authentication. So, what exactly does face recognition do? Face recognition is a broad
problem of identifying or verifying a person in digital images or video frames through facial biometric patterns and data. The
technology collects a set of unique biometric data of each person associated with their face and facial expression to authenticate a
person. Face recognition technology is mostly used for two types of tasks:
Face Verification: given a face image, match it with known images in a secure database, and give a yes/no decision.
I. INTRODUCTION
We provide a self-guaranteed secure program and its successful methods to overcome the risks of illegal attacks. This method ensures the
security of a program by giving method-level security that bolsters the further implemented security measures. One of the most common
computer authentications is for a user to submit a username and text password but the vulnerabilities of this method are plenty One of the
main problems that could arise is the difficulty of remembering passwords. Studies have shown that user usually tends to pick short
passwords so that the passwords are easy to remember. These passwords can also be guessed. To protect any system, authentication must
be provided so that only authorized persons can have the right to use or handle that system and data related to that system securely. In
order for the authentication system to be practical, three-level authentications are designed to provide additional security. There are many
schemes that had been proposed but still have their weaknesses. For our information, the three-level authentication is the combination of
three existing scheme which is, pattern lock and one-time password (OTP) to form better protection One of the approaches normally in
use is the common authentication procedure in which a user needs only a user name and password, in other to make use of an
authentication and authorization system in which every client has the right to access the data and applications which are only appropriate
to his or her job.
A. Problem Statement
Authentication is an activity to authenticate the person’s credential that wishes to perform the activity. In the process of authentication,
the password entered by the user will be transmitted along the traffic to the authentication server in order to allow the server to grant
access to the authorized user. When the password is transmitted, the attackers will try to sniff into the network to obtain data that include
the user's password. Currently, there is a rainbow table which able to trace the password with the hash algorithm to obtain the user's
password. Once the password is succeeded to be decrypted, the attackers can use the user credential to do something illegal such as fraud
others which will cause the user to lose in credit. According to Pagliery(2014), there is 47% of the American adults accounts been hacked
in that year. Their personal information is exposed by the hackers. Due to the problem exists, there are more people no longer trust that
password will be able to protect their online account. According to Suleyman (2017), some of the attackers will sell the email account
that is been hacked to others to gain profit. It is important to protect our own account because our credit is priceless. It is hard to trace the
attackers in the cyber world. The secure login system is needed to ensure the cybersafety. Therefore, this project would like to provide
alternative ways to log in to a system because current login system is not secure enough..
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2406
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at [Link]
B. Objective
The Main Purpose of this project is to provide security to enterprises using multiple level of authentication .Here we are using three level
authentication system 1. Inserting user credentials to database [Link] RFID card 3. Face detection.
A. RFID Sensor
Rc522 - RFID reader/writer 13.56mhz with cards kit includes a 13.56mhz rf reader cum writer module that uses an rc522 ic and two s50
RFID cards. The mf rc522 is a highly integrated transmission module for contactless communication at 13.56 MHz. Rc522 supports iso
14443a/mifare mode.
Rc522 - RFID reader features an outstanding modulation and demodulation algorithm to serve effortless of communication at 13.56
MHz. The s50 RFID cards will ease up the process helping you to learn and add the 13.56 MHz rf transition to your project.
The module uses spi to communicate with microcontrollers. The open-hardware community already has a lot of projects exploiting the
rc522 – RFID communication, using Arduino.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2407
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at [Link]
C. LCD display
LCD (Liquid Crystal Display) is a type of flat panel display which uses liquid crystals in its primary form of operation. LEDs have a
large and varying set of use cases for consumers and businesses, as they can be commonly found in smartphones, televisions, computer
monitors and instrument panels. LCDs were a big leap in terms of the technology they replaced, which include light-emitting diode
(LED) and gas-plasma displays. LCDs allowed displays to be much thinner than cathode ray tube (CRT) technology. LCDs consume
much less power than LED and gas display displays because they work on the principle of blocking light rather than emitting it. Where
an LED emits light, the liquid crystals in an LCD produces an image using a backlight.
IV. RESULT
Adding a smart card or pin, or a biometric factor can greatly increase security over the username and password, which can easily be
gained through breaches or even simple social engineering. Advanced authentication helps to prevent a malicious party from spoofing the
identity of a valid user to gain access to the system. Of course, fingerprints can be faked and smart cards can be stolen. There is no cure-
all for network security, but using multiple factors for authentication to systems can minimize the threat greatlyadding a smart card or
pin, or a biometric factor can greatly increase security over the username and password, which can easily be gained through breaches or
even simple social engineering. Advanced authentication helps to prevent a malicious party from spoofing the identity of a valid user to
gain access to the system. Of course, fingerprints can be faked and smart cards can be stolen. There is no cure-all for network security,
but using multiple factors for authentication to systems can minimize the threat greatly
V. CONCLUSION
Three-level authentication system had been applied to the upper system which makes it extraordinarily secure at the facet of additional
ease. This method can facilitate Man-in-the-middle attacks and Brute-force attacks on the user’s side. A three-level security system could
also be a protracted approach since the user should enter details rigorously for all 3 security levels and eventually, the user can add any
image for its final level Authentications. Therefore, this method isn’t appropriate for the overall purpose of security since it takes time to
fill altogether three security-level details. but it’ll undoubtedly be helpful in high-security levels wherever the protection of data could
also be a concern and time quality is secondary
As a key element in facial imaging applications, such as facial recognition and face analysis, face detection creates various
advantages for users, including the following:
1) Improved Security: Face detection improves surveillance efforts and helps track down criminals and terrorists. Personal security
is enhanced when users use their faces in place of passwords because there's nothing for hackers to steal or change.
2) Easy to Integrate: Face detection and facial recognition technology is easy to integrate, and most applications are compatible
with the majority of cybersecurity software.
3) Automated Identification: In the past, identification was manually performed by a person; this was inefficient and frequently
inaccurate. Face detection allows the identification process to be automated, saving time and increasing accuracy.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2408
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at [Link]
REFERENCES
[1] Abdurrahman, U. A., Kaiiali, M., & Muhammad, J., 2013. A new mobile-based multi-factor authentication scheme using pre-shared number, GPS location and time
stamp. In: 2013 International Conference on Electronics, Computer and Computation, ICECCO 2013, 293–296. [Link]
[2] Abo-Zahhad, M., Ahmed, S.M., Abbas, S.N., 2015. A new multi-level approach to EEG based human authentication using eye blinking. Pattern Recognit. Lett. 1–10.
[Link]
[3] Chakraborty, N., Randhawa, G.S., Das, K., Mondal, S., 2016. MobSecure: a shoulder surfing safe login approach implemented on mobile device. Procedia Comput.
Sci. 93 (September), 854–861. [Link]
[4] Ding, D., Han, Q.-L., Xiang, Y., Ge, X., Zhang, X.-M., 2017. A survey on security control and attack detection for industrial cyber-physical systems.
Neurocomputing. [Link]
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2409
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue V May 2023- Available at [Link]
BIOGRAPHIES
Ashish Kumar
Student,
Dept. of Electronics and
Telecommunication Engineering,
Sinhgad College of Engineering,
Maharashtra, India.
Abhinav Raj
Student,
Dept. of Electronics and
Telecommunication Engineering,
Sinhgad College of Engineering,
Maharashtra, India.
Sourabh Suman
Student,
Dept. of Electronics and
Telecommunication Engineering,
Sinhgad College of Engineering,
Maharashtra, India.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2410