AI MFA System
AI MFA System
AI MFA System
Group Members:
Proposed Supervisor:
Name: _________________
Signature: ______________
Name: _________________
Signature: ______________
1
Contact Number: +92 3409527177
Table of Content
1. Introduction..........................................................................................4
2. Problem statement...............................................................................4
3. Objectives............................................................................................5
1. Literature Review.................................................................................5
2. Methodology for Implementation of Project..........................................5
3. Budget Details......................................................................................6
4. Project Implementation Schedule.........................................................7
5. Utilization of Project Results.................................................................7
6. FYP to SDG’s Mapping........................................................................8
7. Undertaking..........................................................................................8
8. Proposed Supervisor’s Comments.......................................................8
9. Comments of FYP Coordinator............................................................9
10. Approval by the Chairman of Department..........................................9
11. References.........................................................................................9
1. Introduction
Authentication is a technique and technology aim to establish a connection between
two entities. This connection relies on trust and certainty that the involved parties are
indeed the authentic ones in forging the association. The widely employed method of
authentication revolves around the utilization of passwords, which are employed
across a range of services including social networks, bank accounts, websites, and
various applications. However, passwords can be susceptible to cracking through
various means, and simpler methods can be targeted without the need for extensive
computations. The most effective approach to mitigate password attacks is to
augment security measures and introduce complexity into the authentication
process. multi-factor authentication (MFA) plays a vital role in this context.
2. Problem statement
One problem addressed by multi-factor authentication is the inherent vulnerability of
relying solely on passwords for user authentication. Passwords can be easily stolen,
or cracked, putting sensitive information and systems at risk. Attackers can employ
various methods, such as phishing, keylogging, to obtain passwords and gain
2
unauthorized access to accounts or systems. This problem can be solved using
various authentication mechanism which is typically called multi-factor authentication
(MFA). Two or more mechanisms can be combined to ensure strong security against
unauthorized access attempts. For example The most common form of strong
authentication mechanisms is using the password in conjunction with OTP.
Three common forms of authentication: something the user knows (e.g., password or
PIN), something the user has (e.g., a physical token or device for generating OTPs
or receiving push notifications), and something the user is (biometrics like
fingerprints or face recognition). Biometrics are becoming more popular due to their
uniqueness and personal nature in verifying identity.
3. Objectives
To Implement multiple layers of authentication the user has to strengthen
protection against unauthorized access.
To create a user interface that contains registration and login. After successful
registration, an OTP will be generated by displaying it in the QR code, which
will be scanned using Google authenticator.
To Detect and handle incorrect login and signup attempts, such as entering
wrong usernames or passwords email mobile number.
4. Literature Review
The literature review identifies the limitations of traditional authentication methods,
including knowledge-based, ownership-based, and biometric authentication.
Knowledge-based methods, while familiar, are highly vulnerable to various attacks
and often result in insecure passwords. Ownership-based methods, such as
hardware tokens, provide an additional security layer but can be susceptible to
physical theft. Biometric authentication, although offering a unique and personalized
way to verify users, has issues related to accuracy, replication, and data security.
To address these challenges, the project will explore the integration of multi-factor
authentication systems, combining these techniques to provide a more secure and
reliable method of user verification. By analyzing the strengths and weaknesses of
3
each approach, the project aims to create a robust authentication system that
enhances both security and user experience.
Frontend Technologies :
HTML: For structuring the content and layout of the user interface.
CSS: To style and design the UI, ensuring a responsive and user-friendly
experience.
JavaScript: For adding interactivity and client-side validation, such as handling
form submissions and dynamically updating content.
Backend Technologies :
PHP or Python (Flask/Django): a server-side programming languages or python
framework Flash or Django to manage the logic behind the multi-factor
authentication system, handle user input, and interact with the database.
MySQL: A relational database management system for storing user credentials,
OTPs (One-Time Passwords), login attempts, and session data securely
6. Budget Details
1. Hardware Costs:
Security Tokens (Optional, for Ownership-Based Authentication):
a. Estimated number of tokens: 2
b. Cost per token: $10
c. Total: $20
2. Software cost:
Authentication Software Development Tools:
a. Utilizing primarily free tools (e.g., open-source libraries).
b. Total: $0 (using free resources).
3. Email and SMS Notification Service (for OTP):
a. Estimated number of messages: 200
b. Cost per message: $0.03
c. Total: $6
4. Development Costs:
a. Estimated hourly rate: $20
b. Estimated development time: 40 hours
c. Total: $800
4
Month Month Month Month Month Month
Activity 6
1 2 3 4 5
Collection of
Literature √
Study of Literature
√
Analysis of
Proposed Scheme √
Preparation of
Schemes / Model √
Implementation of
Schemes/Model √
Analysis &
Simulation, √
Hardware Testing
Result Formulation
√
Final Write-up &
FYP Report √
Submission
5
for digital infrastructure. By
enhancing authentication methods, it
Build resilient infrastructure, promote
helps protect critical systems and
inclusive and sustainable
data from cyber threats, thereby
industrialization and foster innovation.
increasing the overall resilience of IT
infrastructure in various industries.
By implementing a secure
authentication system, the project
ensures that all users, regardless of
their socio-economic background,
REDUCED INEQUALITIES
can safely access digital services.
Goal 2 Reduce inequality within and among
This is especially important for
countries
marginalized communities that may
rely on online platforms for essential
services like banking, education, and
healthcare.
By providing secure access to
essential services, such as public
transportation and municipal
SUSTAINABLE CITIES AND resources, my project can help
COMMUNITIES ensure that citizens interact safely
Goal 3 Make cities and human settlements with digital platforms, thereby a
inclusive, safe, resilient, and sense of security in urban
sustainable environments. to protect community
members from cyber threats through
authentication my project contributes
to safe urban environment.
10. Undertaking
This is to certify that to the best of my knowledge; the content of this project proposal
is my own work. This proposal has not been submitted for any degree or other
purposes. I certify that the intellectual content of this project is the product of my own
work and that all the assistance received in preparing this proposal and sources
have been acknowledged.
Signature: _______________
Reg # 21MDBCS116
6
Signature: ________________
Reg # 21MDBCS170
Signature: _______________
Reg # 21MDBCS180
Signature of Supervisor
Name of Supervisor
Designation of Supervisor
7
Signature of FYP Coordinator: __________________
Dated: __________________
14. References
Proposal Format:
Font: Arial 14 for headings and Arial 12 for rest of text (except title page)
Line spacing: Double
Margins: 1 inch on all sides
Justify Paragraphs: Align text to both right and left margins
Paper Size: A4
Binding information: Single Side Printing and use spiral binding for hard
copies.
8
Other Important Information:
1. Proposals which are submitted after 1st Week of 7th Semester will be
rejected.
2. The students will discuss their proposals with concerned proposed
supervisors. Only
hard copies duly signed by the concerned Supervisor / Teacher will be
accepted.
3. Any group having more than THREE members will be rejected