Three-Tier Role-Based Authentication with RC-SSO and Mobile Secret Code Access
DOI:
https://doi.org/10.31838/NJAP/08.02.22Keywords:
Multi-layer authentication, Confidential passcode, Role Integrated Certificate- Single Sign-On, Graphical user interfaceAbstract
The goal of this paper is to show how to create a more secure and advanced authentication mechanism. Because technology is evolving at a rapid pace, security techniques such as authentication schemes must be updated as well. For multi-layer authentication, a user doesn't have to provide passwords. As a third-tier authentication code, we're employing the mobile secret code. In order to obtain access to a particular service, that code word is only available for a limited time. With the confidential passcode, we supply the session duration. After the session duration has passed, the user will be unable to utilize the confidential passcode to access the desired service. Another secret code is required for the user to gain access to the desired service. To widen the scope of user authentication, we've incorporated a smartphone code word as a third-tier authentication code for the first time. As a result, we devised a multi-tier authentication scheme based on unified login system to authorized platforms as a solution to this problem. Three-tier authentication security uses login details, and also pattern recognition and one-time passwords (OTP).
References
1. Kumar, Amit; Mozar, Stefan (2021). [Lecture Notes in Electrical Engineering] ICCCE 2020 Volume 698 (Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering) ||doi:10.1007/978-981-15-7961-5
2. Setianto, Dwi, Y., Wahyuningrum, & Estri, S. (2021). Multi-Tier Model with JSON-RPC in Telemedicine Devices Authentication and Authorization Protocol. 2021 7th International Conference on Engineering, Applied Sciences and Technology (ICEAST). doi:10.1109/iceast52143.2021.9426308
3. Somashekhar, K., & Eswara Reddy, B. (2021). Performance Evaluation of Multi-Tier Application by using the Comprehensive Workload Modelling in the Cloud. 2021 5th International Conference on Computing Methodologies and Communication (ICCMC). doi:10.1109/iccmc51019.2021.9418275
4. Feng, B., Hu, X., & Orji, I. J. (2021). Multi-tier supply chain sustainability in the pulp and paper industry: a framework and evaluation methodology. International Journal of Production Research, 1–27. doi:10.1080/00207543.2021.1890260
5. Mariani, Leonardo, Mauro Pezzè, Oliviero Riganelli, and Rui Xin. "Predicting failures in multi-tier distributed systems." Journal of Systems and Software 161 (2020): 110464. doi: 10.1016/j.jss.2019.110464.
6. Chatzoglou, E., Kambourakis, G., & Kouliaridis, V. (2021). A Multi-Tier Security Analysis of Official Car Management Apps for Android. Future Internet, 13(3), 58. doi:10.3390/fi13030058
7. Li, Xiong, Maged Hamada Ibrahim, Saru Kumari, and Rahul Kumar. "Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors." Telecommunication Systems 67, no. 2 (2018): 323-348.
8. Manzoor, Awais, Munam Ali Shah, Hasan Ali Khattak, Ikram Ud Din, and Muhammad Khurram Khan. "Multi‐tier authentication schemes for fog computing: Architecture, security perspective, and challenges." International Journal of Communication Systems (2019): e4033.
9. Soyemi, Jumoke, and Mudasiru Hammed. "Fraud Detection System using Multi-tiered Authentication Scheme." (2020): 1-10.
10. Zhang, Shiqiang, Yang Cao, Zhenhu Ning, Fei Xue, Dongzhi Cao, and Yongli Yang. "A heterogeneous IOT node authentication scheme based on hybrid blockchain and trust value." KSII Transactions on Internet and Information Systems (TIIS) 14, no. 9 (2020): 3615-3638.
11. Rajasekar, Vani, J. Premalatha, K. Sathya, and Muzafer Saračević. "Secure remote user authentication scheme on health care, IoT and cloud applications: A multilayer systematic survey." Acta Polytechnica Hungarica 18, no. 3 (2021): 87-106.
12. Narwal, Bhawna, and Amar Kumar Mohapatra. "SEEMAKA: Secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks." Wireless Personal Communications 113, no. 4 (2020): 1985-2008.
13. Li, Xing, He Jianmin, BingJie Hou, and Peiyang Zhang. "Exploring the innovation modes and evolution of the cloud-based service using the activity theory on the basis of big data." Cluster Computing 21, no. 1 (2018): 907-922.
14. Lin, Ying-Dar, Yuan-Cheng Lai, Jian-Xun Huang, and Hsu-Tung Chien. "Three-tier capacity and traffic allocation for core, edges, and devices for mobile edge computing." IEEE Transactions on Network and Service Management 15, no. 3 (2018): 923-933
15. Kamal, Neel, and Prasun Ghosal. "Three tier architecture for iot driven health monitoring system using raspberry pi." In 2018 IEEE International Symposium on Smart Electronic Systems (iSES)(Formerly iNiS), pp. 167-170. IEEE, 2018.
16. Shahzadi, Romana, Ambreen Niaz, Mudassar Ali, Muhammad Naeem, Joel JPC Rodrigues, Farhan Qamar, and Syed Muhammad Anwar. "Three tier fog networks: Enabling IoT/5G for latency sensitive applications." China Communications 16, no. 3 (2019): 1-11.
17. Rosário, Denis, Matias Schimuneck, João Camargo, Jéferson Nobre, Cristiano Both, Juergen Rochol, and Mario Gerla. "Service migration from cloud to multi-tier fog nodes for multimedia dissemination with QoE support." Sensors 18, no. 2 (2018): 329.
18. Ganchev, Ivan, Zhanlin Ji, Máirtín O'Droma, and Li Zhao. "Smart recommendation of mobile services to consumers." IEEE Transactions on Consumer Electronics 63, no. 4 (2017): 499-508.
19. Manzoor, Awais, Abdul Wahid, Munam Ali Shah, Adnan Akhunzada, and Faisal Fayyaz Qureshi. "Secure login using multi-tier authentication schemes in fog computing." EAI Endorsed Transactions on Internet of Things 3, no. 11 (2018).
20. Putra, Dea Saka Kurnia, Mohamad Ali Sadikin, and Susila Windarta. "S-Mbank: Secure mobile banking authentication scheme using signcryption, pair-based text authentication, and contactless smart card." In 2017 15th international conference on quality in research (QiR): international symposium on electrical and computer engineering, pp. 230-234. IEEE, 2017.
21. Roy, Sandip, Santanu Chatterjee, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, and Athanasios V. Vasilakos. "On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services." IEEE Access 5 (2017): 25808-25825.
22. Sharma, Geeta, and Sheetal Kalra. "A lightweight user authentication scheme for cloud-IoT based healthcare services." Iranian Journal of Science and Technology, Transactions of Electrical Engineering 43, no. 1 (2019): 619-636.
23. Guo, Yimin, and Yajun Guo. "FogHA: An efficient handover authentication for mobile devices in fog computing." Computers & Security (2021): 102358.
24. Sajjad, Muhammad, Salman Khan, Tanveer Hussain, Khan Muhammad, Arun Kumar Sangaiah, Aniello Castiglione, Christian Esposito, and Sung Wook Baik. "CNN-based anti-spoofing two-tier multi-factor authentication system." Pattern Recognition Letters 126 (2019): 123-131.
25. Narwal, Bhawna, and Amar Kumar Mohapatra. "A Survey on security and authentication in Wireless Body Area Networks." Journal of Systems Architecture 113 (2021): 101883.
26. Agrawal, Chanchal G., and J. B. Kulkarni. "Enhancing the security in WSN using three tier security architecture." International Journal of Innovative Research in Information Security (IJIRIS) 1 (2014): 40-47.
27. Tolba, Amr, and Ayman Altameem. "A three-tier architecture for securing IoV communications using vehicular dependencies." IEEE Access 7 (2019): 61331-61341.
28. Sbeiti, Mohamad, Thang Tran, Sebastian Subik, Andreas Wolff, and Christian Wietfeld. "MuSE: novel efficient multi-tier communication security model for emergency and rescue operations." In 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 929-934. IEEE, 2011.
29. Anand, Darpan, Vineeta Khemchandani, Munish Sabharawal, Omar Cheikhrouhou, and Ouissem Ben Fredj. "Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems." Security and Communication Networks 2021 (2021).
30. Mandal, Sanjeev Kumar, and A. R. Deepti. "A General Approach of Authentication Scheme and its Comparative Study." International Journal of Computer (IJC) 26, no. 1 (2017): 15-22.




