Optimized Solutions for Robust and Efficient Two-Factor Authentication in Networking Environments

dc.contributor.authorHussein Alkattan
dc.contributor.authorRaad S. Alhumaima
dc.contributor.authorAmr Badr
dc.contributor.authorMaina, Peter M.
dc.date.accessioned2026-02-10T08:26:21Z
dc.date.issued2025-12
dc.description.abstractWith the rise of escalating cyber threats to the present-day networking environment, the traditional two-factor authentication (2FA) mechanisms remain ineffective in mitigating the sophisticated attack vectors like phishing, SIM-swapping and social engineering. These loops holes, specifically in SMS- and email-based 2FA, are opening users and network infrastructure up to substantial danger. This paper presents optimized and robust enhancements to 2FA technology, and points out cryptographic technologies like ECC, the addition of X.509 digital certificates, and biometric and behavioral authentication solutions. Then, the performance of these distributed trust models is compared, in terms of security efficiency, usability, and deploy ability, with a complete comparative study of these models in dynamic networking. The paper also includes real-world examples of implementing such multi-layered 2FA schemes being tensioned between a strong security protection and what is deemed to be user acceptable. The results showcase best practices and challenges in building secure and efficient as well as future-proof authentication systems that match the requirements of complex network environments.
dc.identifier.issn3006-5372
dc.identifier.otherhttps://doi.org/10.58496/BJN/2025/017
dc.identifier.urihttps://mesopotamian.press/journals/index.php/BJN/article/view/987/965
dc.identifier.urihttps://repository.mnu.ac.ke/handle/123456789/93
dc.language.isoen_US
dc.publisherBabylonian Journal of Networking
dc.subjectTwo-Factor Authentication (2FA)
dc.subjectNetwork Security
dc.subjectElliptic Curve Cryptography (ECC)
dc.subjectBiometric Authentication
dc.subjectDigital Certificates
dc.subjectBehavioral Biometrics
dc.subjectPhishing
dc.subjectSIM-Swapping
dc.subjectMulti-Network Environments.
dc.titleOptimized Solutions for Robust and Efficient Two-Factor Authentication in Networking Environments
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Abstract.pdf
Size:
5.75 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: