Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2016 (2016), Article ID 6105053, 5 pages
Research Article

Access to Network Login by Three-Factor Authentication for Effective Information Security

1Research Scholar, Sathyabama University, Chennai 600119, India
2Research Supervisor, Sathyabama University, Chennai 600119, India
3Faculty of Operations & Systems, IBS, Hyderabad 501203, India

Received 5 November 2015; Revised 5 January 2016; Accepted 14 January 2016

Academic Editor: Michele Nappi

Copyright © 2016 S. Vaithyasubramanian et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Today’s technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security.