Optimized Solutions for Robust and Efficient Two-Factor Authentication in Networking Environments
| dc.contributor.author | Hussein Alkattan | |
| dc.contributor.author | Raad S. Alhumaima | |
| dc.contributor.author | Amr Badr | |
| dc.contributor.author | Maina, Peter M. | |
| dc.date.accessioned | 2026-02-10T08:26:21Z | |
| dc.date.issued | 2025-12 | |
| dc.description.abstract | With the rise of escalating cyber threats to the present-day networking environment, the traditional two-factor authentication (2FA) mechanisms remain ineffective in mitigating the sophisticated attack vectors like phishing, SIM-swapping and social engineering. These loops holes, specifically in SMS- and email-based 2FA, are opening users and network infrastructure up to substantial danger. This paper presents optimized and robust enhancements to 2FA technology, and points out cryptographic technologies like ECC, the addition of X.509 digital certificates, and biometric and behavioral authentication solutions. Then, the performance of these distributed trust models is compared, in terms of security efficiency, usability, and deploy ability, with a complete comparative study of these models in dynamic networking. The paper also includes real-world examples of implementing such multi-layered 2FA schemes being tensioned between a strong security protection and what is deemed to be user acceptable. The results showcase best practices and challenges in building secure and efficient as well as future-proof authentication systems that match the requirements of complex network environments. | |
| dc.identifier.issn | 3006-5372 | |
| dc.identifier.other | https://doi.org/10.58496/BJN/2025/017 | |
| dc.identifier.uri | https://mesopotamian.press/journals/index.php/BJN/article/view/987/965 | |
| dc.identifier.uri | https://repository.mnu.ac.ke/handle/123456789/93 | |
| dc.language.iso | en_US | |
| dc.publisher | Babylonian Journal of Networking | |
| dc.subject | Two-Factor Authentication (2FA) | |
| dc.subject | Network Security | |
| dc.subject | Elliptic Curve Cryptography (ECC) | |
| dc.subject | Biometric Authentication | |
| dc.subject | Digital Certificates | |
| dc.subject | Behavioral Biometrics | |
| dc.subject | Phishing | |
| dc.subject | SIM-Swapping | |
| dc.subject | Multi-Network Environments. | |
| dc.title | Optimized Solutions for Robust and Efficient Two-Factor Authentication in Networking Environments | |
| dc.type | Article |
