Skip to main content

Two-Factor Authentication Using QR Code and OTP

  • Conference paper
  • First Online:
Advances in Data and Information Sciences (ICDIS 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 796))

Included in the following conference series:

  • 128 Accesses

Abstract

Two-factor authentication (2FA) has become a widely accepted security measure for online transactions, especially for website login. In this paper, we present a study on the QR and OTP-based 2FA systems for website login. These methods require the user to provide two pieces of evidence to confirm their identity, enhancing security by adding an additional layer of protection to the login process. We discuss the advantages and disadvantages of using QR codes and OTPs for 2FA, including ease of use, security, and implementation requirements. Furthermore, we provide a step-by-step guide to implementing QR and OTP-based 2FA for website login. The study highlights the significance of 2FA in securing online transactions and emphasizes the need to implement it to provide an additional layer of security to website login. Overall, this paper provides valuable insights into the QR and OTP-based 2FA systems for website login and their importance in enhancing online security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alharbi E, Alghazzawi D (2019) Two factor authentication framework using OTP-SMS based on blockchain. Trans Mach Learn Artif Intell 7(3):17–27

    Google Scholar 

  2. De Cristofaro E, Du H, Freudiger J, Norcie G (2013) A comparative usability study of two-factor authentication. arXiv preprint arXiv:1309.5344

  3. DeFigueiredo D (2011) The case for mobile two-factor authentication. IEEE Sec Privacy 9(5):81–85

    Article  Google Scholar 

  4. Harini N, Padmanabhan T et al (2013) 2 Cauth: a new two factor authentication scheme using qr-code. Int J Eng Technol 5(2):1087–1094

    Google Scholar 

  5. Iyanda AR, Fasasi ME (2022) Development of two-factor authentication login system using dynamic password with SMS verification. Int J Educ Manag Eng 12(3):13

    Google Scholar 

  6. Lee YS, Kim NH, Lim H, Jo H, Lee HJ (2010) Online banking authentication system using mobile-OTP with QR-code. In: Proceedings of the 5th international conference on computer sciences and convergence information technology. IEEE, pp 644–648

    Google Scholar 

  7. Liao KC, Lee WH (2010) A novel user authentication scheme based on QR-code. J Netw 5(8):937

    Google Scholar 

  8. Liao KC, Lee WH, Sung MH, Lin TC (2009) A one-time password scheme with QR-code based on mobile phone. In: Proceedings of the 2009 fifth international joint conference on INC, IMS and IDC, pp 2069–2071

    Google Scholar 

  9. Nwankwo C, Adigwe W, Nwankwo W, Kizito AE, Konyeha S, Uwadia F (2022) An improved password-authentication model for access control in connected systems. In: Proceedings of the 2022 5th information technology for education and development (ITED). IEEE, pp 1–8

    Google Scholar 

  10. Ometov A, Bezzateev S, Mäkitalo N, Andreev S, Mikkonen T, Koucheryavy Y (2018) Multi-factor authentication: a survey. Cryptography 2(1):1

    Article  Google Scholar 

  11. Parmar H, Nainan N, Thaseen S (2012) Generation of secure one-time password based on image authentication. J Comput Sci Inform Technol 7:195–206

    Google Scholar 

  12. Wang D, Wang P (2016) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Depend Sec Comput 15(4):708–722

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Avanish Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, A., Singh, A., Tripathi, A., Sharma, S. (2024). Two-Factor Authentication Using QR Code and OTP. In: Tiwari, S., Trivedi, M.C., Kolhe, M.L., Singh, B.K. (eds) Advances in Data and Information Sciences. ICDIS 2023. Lecture Notes in Networks and Systems, vol 796. Springer, Singapore. https://doi.org/10.1007/978-981-99-6906-7_10

Download citation

Publish with us

Policies and ethics