Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

AI MFA System

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

UNIVERSITY OF ENGINEERING & TECHNOLOGYMARDAN

DEPARTMENT OF COMPUTER SCIENCE

FINAL YEAR PROJECT PROPOSAL

TITLE OF THE PROJECT

AI-POWERED MULTI-FACTOR SECURE AUTHENTICATION


SYSTEM

Group Members:

Name Registration # Email


Ahsan wahab 21MDBCS116 ahsanwahab14@gmail.com
Muhammad Shamil 21MDBCS170 shamilhidayat03@gmail.com
Ali Hamza 21MDBCS180 Alihamza.mrd@gmail.com

Proposed Supervisor:

Name: _________________

Signature: ______________

Co-Supervisor (If any):

Name: _________________

Signature: ______________

1
Contact Number: +92 3409527177

Table of Content

1. Introduction..........................................................................................4
2. Problem statement...............................................................................4
3. Objectives............................................................................................5
1. Literature Review.................................................................................5
2. Methodology for Implementation of Project..........................................5
3. Budget Details......................................................................................6
4. Project Implementation Schedule.........................................................7
5. Utilization of Project Results.................................................................7
6. FYP to SDG’s Mapping........................................................................8
7. Undertaking..........................................................................................8
8. Proposed Supervisor’s Comments.......................................................8
9. Comments of FYP Coordinator............................................................9
10. Approval by the Chairman of Department..........................................9
11. References.........................................................................................9

1. Introduction
Authentication is a technique and technology aim to establish a connection between
two entities. This connection relies on trust and certainty that the involved parties are
indeed the authentic ones in forging the association. The widely employed method of
authentication revolves around the utilization of passwords, which are employed
across a range of services including social networks, bank accounts, websites, and
various applications. However, passwords can be susceptible to cracking through
various means, and simpler methods can be targeted without the need for extensive
computations. The most effective approach to mitigate password attacks is to
augment security measures and introduce complexity into the authentication
process. multi-factor authentication (MFA) plays a vital role in this context.

2. Problem statement
One problem addressed by multi-factor authentication is the inherent vulnerability of
relying solely on passwords for user authentication. Passwords can be easily stolen,
or cracked, putting sensitive information and systems at risk. Attackers can employ
various methods, such as phishing, keylogging, to obtain passwords and gain

2
unauthorized access to accounts or systems. This problem can be solved using
various authentication mechanism which is typically called multi-factor authentication
(MFA). Two or more mechanisms can be combined to ensure strong security against
unauthorized access attempts. For example The most common form of strong
authentication mechanisms is using the password in conjunction with OTP.

Three common forms of authentication: something the user knows (e.g., password or
PIN), something the user has (e.g., a physical token or device for generating OTPs
or receiving push notifications), and something the user is (biometrics like
fingerprints or face recognition). Biometrics are becoming more popular due to their
uniqueness and personal nature in verifying identity.

3. Objectives
 To Implement multiple layers of authentication the user has to strengthen
protection against unauthorized access.

 To create a user interface that contains registration and login. After successful
registration, an OTP will be generated by displaying it in the QR code, which
will be scanned using Google authenticator.

 To Detect and handle incorrect login and signup attempts, such as entering
wrong usernames or passwords email mobile number.

 To Enable authentication through a mobile device, using methods like OTP,


push notifications, or biometrics (e.g., fingerprint or face recognition).

 To send a unique, time-sensitive code to the user’s registered email or mobile


number for confirmation after successful login.

 To Implement a user-friendly interface that minimizes the complexity of multi-


factor authentication. Offer seamless transitions between authentication steps
(e.g., password, OTP), ensuring users can authenticate quickly and easily.

4. Literature Review
The literature review identifies the limitations of traditional authentication methods,
including knowledge-based, ownership-based, and biometric authentication.
Knowledge-based methods, while familiar, are highly vulnerable to various attacks
and often result in insecure passwords. Ownership-based methods, such as
hardware tokens, provide an additional security layer but can be susceptible to
physical theft. Biometric authentication, although offering a unique and personalized
way to verify users, has issues related to accuracy, replication, and data security.
To address these challenges, the project will explore the integration of multi-factor
authentication systems, combining these techniques to provide a more secure and
reliable method of user verification. By analyzing the strengths and weaknesses of

3
each approach, the project aims to create a robust authentication system that
enhances both security and user experience.

5. Methodology for Implementation of Project

Frontend Technologies :
HTML: For structuring the content and layout of the user interface.
CSS: To style and design the UI, ensuring a responsive and user-friendly
experience.
JavaScript: For adding interactivity and client-side validation, such as handling
form submissions and dynamically updating content.
Backend Technologies :
PHP or Python (Flask/Django): a server-side programming languages or python
framework Flash or Django to manage the logic behind the multi-factor
authentication system, handle user input, and interact with the database.
MySQL: A relational database management system for storing user credentials,
OTPs (One-Time Passwords), login attempts, and session data securely

6. Budget Details
1. Hardware Costs:
Security Tokens (Optional, for Ownership-Based Authentication):
a. Estimated number of tokens: 2
b. Cost per token: $10
c. Total: $20
2. Software cost:
Authentication Software Development Tools:
a. Utilizing primarily free tools (e.g., open-source libraries).
b. Total: $0 (using free resources).
3. Email and SMS Notification Service (for OTP):
a. Estimated number of messages: 200
b. Cost per message: $0.03
c. Total: $6
4. Development Costs:
a. Estimated hourly rate: $20
b. Estimated development time: 40 hours
c. Total: $800

7. Project Implementation Schedule


State the project milestones with time Schedule. A Sample is given below.

4
Month Month Month Month Month Month
Activity 6
1 2 3 4 5
Collection of
Literature √
Study of Literature

Analysis of
Proposed Scheme √
Preparation of
Schemes / Model √
Implementation of
Schemes/Model √
Analysis &
Simulation, √
Hardware Testing
Result Formulation

Final Write-up &
FYP Report √
Submission

8. Utilization of Project Results


The results of the Multi-Factor Secure Authentication System will be instrumental in
enhancing security protocols across various sectors, particularly in online banking, e-
commerce, healthcare, and corporate environments. By implementing a robust multi-
factor authentication (MFA) mechanism, the project will significantly reduce the risk
of unauthorized access to sensitive user accounts and personal data. These
advancements can be integrated into existing applications, offering organizations a
practical framework to improve their security posture. Additionally, the project
outcomes can serve as a valuable case study in educational institutions, facilitating
discussions on best practices in cybersecurity and authentication methods.
Furthermore, the insights gained from user feedback will guide future enhancements
to the system, ensuring its continued relevance and effectiveness. The project
results may also inspire further research into innovative authentication technologies,
including AI and machine learning applications.

9. FYP to SDG’s Mapping

Sustainable Development Goals (SDGs)


Goal# Description Justification
Goal 1 INDUSTRY, INNOVATION, AND The project contributes to creating
INFRASTRUCTURE robust security frameworks essential

5
for digital infrastructure. By
enhancing authentication methods, it
Build resilient infrastructure, promote
helps protect critical systems and
inclusive and sustainable
data from cyber threats, thereby
industrialization and foster innovation.
increasing the overall resilience of IT
infrastructure in various industries.
By implementing a secure
authentication system, the project
ensures that all users, regardless of
their socio-economic background,
REDUCED INEQUALITIES
can safely access digital services.
Goal 2 Reduce inequality within and among
This is especially important for
countries
marginalized communities that may
rely on online platforms for essential
services like banking, education, and
healthcare.
By providing secure access to
essential services, such as public
transportation and municipal
SUSTAINABLE CITIES AND resources, my project can help
COMMUNITIES ensure that citizens interact safely
Goal 3 Make cities and human settlements with digital platforms, thereby a
inclusive, safe, resilient, and sense of security in urban
sustainable environments. to protect community
members from cyber threats through
authentication my project contributes
to safe urban environment.

10. Undertaking

This is to certify that to the best of my knowledge; the content of this project proposal
is my own work. This proposal has not been submitted for any degree or other
purposes. I certify that the intellectual content of this project is the product of my own
work and that all the assistance received in preparing this proposal and sources
have been acknowledged.

Signature: _______________

Name: Ahsan wahab

Reg # 21MDBCS116

6
Signature: ________________

Name: muhammad shamil

Reg # 21MDBCS170

Signature: _______________

Name: ali Hamza

Reg # 21MDBCS180

11. Proposed Supervisor’s Comments

Take recommendation of your supervisor for your project work here.


Please note the proposed supervisor may be changed on the recommendation of
FYP Committee and final approval of Chairman.

Signature of Supervisor
Name of Supervisor
Designation of Supervisor

12. Comments of FYP Coordinator

Comments of FYP Coordinator in accordance with recommendations of FYP


Committee.

7
Signature of FYP Coordinator: __________________

Dated: __________________

13. Approval by the Chairman of Department

Signature: __________________ Dated: ___________________

14. References

[1] [K19] Eman.K Focused on Two Factor Authentication Framework Using


OTP – SMS Based. 2019
[2] [QG15] Alex Q. Chen and Weihan Goh. Two Factor Authentication made
Easy. 2015
[3] [J17] Costa , J.. 2FA2P2 : A Two Factor Authentication Scheme .
Technical Report, University of Westminster. 2017.

15. Other Important Instructions

Proposal Format:
Font: Arial 14 for headings and Arial 12 for rest of text (except title page)
Line spacing: Double
Margins: 1 inch on all sides
Justify Paragraphs: Align text to both right and left margins
Paper Size: A4
Binding information: Single Side Printing and use spiral binding for hard
copies.

8
Other Important Information:
1. Proposals which are submitted after 1st Week of 7th Semester will be
rejected.
2. The students will discuss their proposals with concerned proposed
supervisors. Only
hard copies duly signed by the concerned Supervisor / Teacher will be
accepted.
3. Any group having more than THREE members will be rejected

You might also like