<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-6423</journal-id>
<journal-title><![CDATA[Journal of applied research and technology]]></journal-title>
<abbrev-journal-title><![CDATA[J. appl. res. technol]]></abbrev-journal-title>
<issn>1665-6423</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Ciencias Aplicadas y Tecnología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-64232024000200197</article-id>
<article-id pub-id-type="doi">10.22201/icat.24486736e.2024.22.2.2244</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[2F-Authsys: A hyperlocal two-factor authentication system using Near Sound Data Transfer]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Patel]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Trivedi]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Raval]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Dennisan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Vellore Institute of Technology School of Computer Science and Engineering ]]></institution>
<addr-line><![CDATA[Vellore Tamil Nadu]]></addr-line>
<country>India</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<volume>22</volume>
<numero>2</numero>
<fpage>197</fpage>
<lpage>205</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-64232024000200197&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-64232024000200197&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-64232024000200197&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Two-factor authentication (2FA) is a new buzzword in the information security world. Big companies that used passwords as an authentication mechanism now have started transitioning to 2FA. One form of two-factor authentication is known as one-time password (OTP). In today&#8217;s time, there is a lack of a secure multi-factor authentication platform that is also user friendly. In all the major 2FA platforms that exist today, the user has to manually enter the OTP from their phone or email. This problem is further amplified by delays in transmission of OTP via email or SMS. There has also been an increase in the number of botnets that scan large networks and try to open vulnerable ports on cloud hosting networks. An easy-to-use port security solution is not available. This research work aims to create a secure, proof-of-concept implementation of a modern and opinionated two-factor authentication system based on Near Sound Data Transfer (NSDT) technology enabling contactless secure transmission of time-based one-time password (TOTP).]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Authentication]]></kwd>
<kwd lng="en"><![CDATA[TOTP]]></kwd>
<kwd lng="en"><![CDATA[2FA]]></kwd>
<kwd lng="en"><![CDATA[NSDT]]></kwd>
<kwd lng="en"><![CDATA[JWT]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[AlQahtani]]></surname>
<given-names><![CDATA[A. A. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Alamleh]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Gourd]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mugasa]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[0ei2fa: Zero effort indoor two factor authentication]]></source>
<year>2020</year>
<conf-name><![CDATA[ 14International Conference on Innovations in Information Technology]]></conf-name>
<conf-loc> </conf-loc>
<page-range>253-7</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[F. H. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yunos]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Alias]]></surname>
<given-names><![CDATA[M. A. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Simple port knocking method: Against TCP replay attack and port scanning]]></source>
<year>2012</year>
<conf-name><![CDATA[ 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>247-52</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bachmann]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Passwords are dead: alternative authentication methods]]></source>
<year>2014</year>
<conf-name><![CDATA[ 2014IEEE Joint Intelligence and Security Informatics Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>322</page-range><publisher-loc><![CDATA[The Hague, Netherlands ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Choi]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Seo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[D. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sound-proximity: 2-factor authentication against relay attack on passive keyless entry and start system]]></article-title>
<source><![CDATA[Journal of Advanced Transportation]]></source>
<year>2018</year>
<volume>2018</volume>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A source coding scheme for authenticating audio signal with capability of self-recovery and anti-synchronization counterfeiting attack]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2020</year>
<volume>79</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1037-55</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gibson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Conrad]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Maple]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Renaud]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Accessible and secure? Design constraints on image and sound based passwords]]></source>
<year>2010</year>
<conf-name><![CDATA[ 2010International Conference on Information Society]]></conf-name>
<conf-loc> </conf-loc>
<page-range>423-8</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guillet]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Moalla]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Serhrouchni]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Obaid]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[SIP authentication based on HOTP]]></source>
<year>2009</year>
<conf-name><![CDATA[ 7International Conference on Information, Communications and Signal Processing (ICICS)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-4</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hamdane]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Serhrouchni]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Montfaucon]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Guemara]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Using the HMAC-based one-time password algorithm for TLS authentication]]></source>
<year>2011</year>
<conf-name><![CDATA[ 2011Conference on Network and Information Systems Security]]></conf-name>
<conf-loc>La Rochelle, France </conf-loc>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Chonka]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Deng]]></surname>
<given-names><![CDATA[R. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A generic framework for three-factor authentication: Preserving security and privacy in distributed systems]]></article-title>
<source><![CDATA[IEEE Transactions on Parallel and Distributed Systems]]></source>
<year>2010</year>
<volume>22</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1390-7</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Idhom]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wahanani]]></surname>
<given-names><![CDATA[H. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Fauzi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Network Security Applications Using the Port Knocking Method]]></article-title>
<source><![CDATA[Journal of Physics: Conference Series]]></source>
<year>2020</year>
<volume>1569</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>022046</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jia]]></surname>
<given-names><![CDATA[H. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Qing]]></surname>
<given-names><![CDATA[S. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Gu]]></surname>
<given-names><![CDATA[L. Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y. X.]]></given-names>
</name>
</person-group>
<source><![CDATA[Efficient Universally Composable Password-Based Key Exchange]]></source>
<year>2008</year>
<volume>2</volume>
<conf-name><![CDATA[ 2008International Conference on Computational Intelligence and Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>293-8</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khader]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hadi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hudaib]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Covert communication using port knocking]]></source>
<year>2016</year>
<conf-name><![CDATA[ 2016Cybersecurity and Cyberforensics Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>22-7</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[F. F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Sound-based multimodal person identification from signature and voice]]></source>
<year>2010</year>
<conf-name><![CDATA[ FifthInternational Conference on Internet Monitoring and Protection]]></conf-name>
<conf-loc> </conf-loc>
<page-range>84-8</page-range><publisher-loc><![CDATA[Barcelona, Spain ]]></publisher-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Malikovich]]></surname>
<given-names><![CDATA[K. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Turakulovich]]></surname>
<given-names><![CDATA[K. Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Tileubayevna]]></surname>
<given-names><![CDATA[A. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[A method of efficient otp generation using pseudorandom number generators]]></source>
<year>2019</year>
<conf-name><![CDATA[ 2019International Conference on Information Science and Communications Technologies]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-4</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Msahli]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hammi]]></surname>
<given-names><![CDATA[M. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Serhrouchni]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Safe box cloud authentication using TLS extesion]]></source>
<year>2015</year>
<conf-name><![CDATA[ 2015International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Popeea]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Olteanu]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Gheorghe]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rughini&#351;]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Extension of a port knocking client-server architecture with NTP synchronization]]></source>
<year>2011</year>
<conf-name><![CDATA[ 2011RoEduNet International Conference 10th Edition: Networking in Education and Research]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-5</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sel]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Totakura]]></surname>
<given-names><![CDATA[S. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Carle]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[sKnock: port-knocking for masses]]></source>
<year>2016</year>
<conf-name><![CDATA[ 35Symposium on Reliable Distributed Systems Workshops (SRDSW)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Srivastava]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Keshri]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Roy]]></surname>
<given-names><![CDATA[A. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chaurasiya]]></surname>
<given-names><![CDATA[V. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Advanced port knocking authentication scheme with QRC using AES]]></source>
<year>2011</year>
<conf-name><![CDATA[ 2011International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>159-63</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tritilanunt]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Thanyamanorot]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ritdecha]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[A secure authentication protocol using HOTP on USB storage devices]]></source>
<year>2014</year>
<volume>3</volume>
<conf-name><![CDATA[ 2014International Conference on Information Science, Electronics and Electrical Engineering]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1908-12</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[W. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<source><![CDATA[SoundAuth: Secure zero-effort two-factor authentication based on audio signals]]></source>
<year>2018</year>
<conf-name><![CDATA[ 2018 IEEE Conference on Communications and Network Security (CNS)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-9</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Pei]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<source><![CDATA[QuickAuth: two-factor quick authentication based on ambient sound]]></source>
<year>2016</year>
<conf-name><![CDATA[ 2016 IEEE Global Communications Conference (GLOBECOM)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
