Active Authentication by one Time Password Based on Unique Factor and Behavioral Biometric
|
|
|
- Whitney Rich
- 10 years ago
- Views:
Transcription
1 International Journal of Computer Networks and Security, ISSN: , Vol.23, Issue Active Authentication by one Time Password Based on Unique Factor and Behavioral Biometric Khalid Waleed Hussein Nor Fazlida Mohd. Sani Ramlan Mahmod Mohd. Taufik Abdullah ABSTRACT Multi factor authentication technology based on one time password (OTP) is utilized in many fields because of this technology's high security. However, existing OTP schemes suffer from several drawbacks. Moreover, OTP schemes are vulnerable either because of a weakness in hardware devices (e.g., token devices that apply OTP schemes) or because of the use of weak algorithms or methods to generate OTP. A novel authentication scheme based on OTP is presented in this paper. The scheme generates OTP based on unique numbers in addition to the user's behavioral biometric. The purpose of the proposed system is to make the OTP more difficult, thereby restricting unauthorized access. The OTP is made extremely secure and unpredictable. The proposed system can ensure that the user who misuses the system is made liable. Therefore, the system is fit for fields that require high security guarantees, such as e-banking systems, e-government systems, and e-commerce systems. Keywords authentication, one time password, behavioral biometric, Security, multi factor, nonrepudiation I. INTRODUCTION Authentication of communicating entities and the securing transmitted data are essential procedures in establishing secure communications over a public unsecure network[1]. Face-to-face communication cannot be established in electronic authentication; the identity of a user accessing the system cannot be confirmed[2]. The number of malicious Web pages designed to steal users' credentials increased by 258% at the end of Q2 in 2008 compared with the same period in Therefore, protecting users from fraud attacks is extremely important. Many studies have proposed authentication schemes to confirm legitimate users and protect users' credentials from theft [3-6]. One-time Password (OTP) authentication scheme was one of the proposed schemes. OTP is a password valid for only one login session or transaction. OTPs address a number of shortcomings associated with traditional authentication schemes (username and password)[7].the weakness of the OTP authentication scheme is related to the hardware devices responsible for OTP generation, such as the token device [8-11], or the use of weak algorithms or methods to generate OTP [12-15]. Two types of solutions were proposed to overcome the shortcoming related to the token device by utilizing the user's mobile phone to generate OTP [16-18] or by using the mobile device to receive OTP through SMS such as e- bank systems, create new user account in (yahoo, Gmail), and others [19-21]. Using a mobile device in user authentication can be a challenge[22]. The use of a mobile device for user authentication presents the following drawbacks. The user enters a password periodically to initialize a mobile application. As a result, the user is compelled to either save the passwords on their devices or select weak passwords that can be easily inputted on devices[23]. When a user's mobile device is lost or stolen, others could use it to access the user's information[24]. Most solutions employed to generate OTP on mobile devices require connecting the user s mobile device to a PC by Bluetooth or Wi-Fi to install the software on the mobile phone [22]. However, more than 370 mobile malwares are in circulation, most of which are spread through installed software (applications) from the Internet or by connecting mobile devices to infected PCs [25]. The International Mobile Equipment Identity (IMEI) number is utilized by a Global System for Mobile Communications (GSM) network to identify valid devices and can therefore be employed to prevent unauthorized access to a stolen phone[26, 27].
2 International Journal of Computer Networks and Security, ISSN: , Vol.23, Issue Physiological and behavioral characteristics are two strong factors that can be utilized to identify users. Physiological characteristics are those characteristics biologically inherent to the user such as fingerprints and iris scans. Behavioral characteristics are characteristics that indicate the user s habits such as mouse movements and handwriting [28, 29]. The use of physiological characteristics has a drawback, namely, special hardware is required. This special type of hardware is extremely complex and costly [30]. The use of behavioral characteristics does not require a special hardware and is inexpensive. It also allows for the collection of true information from users (every user has his or her own identification) and can be easily merged with existing systems[31, 32]. A new OTP authentication scheme based on unique factors in addition to the behavioral biometrics of the user is proposed in this paper. The proposed scheme is different from traditional authentication schemes because it will work to authenticate user and mobile device which uses to receive OTP. This paper is organized in the following order. Chapter 2 provides an overview of existing studies on OTP. Chapter 3 presents the secure authentication method proposed in this research. Chapter 4 describes the experimental environment and provides the results of comparison with existing mechanisms. Chapter 5 presents the conclusion of this research. 2. RELEVANT RESEARCHES OTP authentication is applied in various fields because it is highly secure. However, existing OTP schemes suffer from several drawbacks; OTP schemes are vulnerable either because of a weakness in the device that implements OTP authentication [8, 9, 33] or because of the use of weak algorithms or methods to generate OTP[13, 34-36]. 2.1 Unsecure Hardware Devices Existing OTP authentication systems are utilized variety devices such as tokens devices, mobile devices, USB devices, and smart cards token to generate OTP. A token device cannot prevent the man in the middle attacks (MITM). This costly device authenticates a user in one server and cannot be utilized with multiple servers [8, 10, 11]. A mobile phone employs a token as software by installing an application in the mobile device to generate OTP. The problem is that when the device is lost or stolen, others can penetrate the system [9, 16]. In addition, most OTP authentication system has no security for mobile holder. USB tokens, and smart cards tokens cannot protect from session based attacks, Trojan and malware attacks as well as password reuse [8, 10, 33]. 2.2 Weakness of OTP generation OTP generation depends on the factors utilized to configure the OTP or on the algorithm employed to generate the OTP. Researchers proved OTP is weak when it depends on a random number[15]. Ku proposed algorithm to generate OTP is a hash-based strong password; however, other researchers proved that the algorithm is not secure enough [34]. Several other researchers proposed algorithms to generate OTPs based on password; however, this method of OTP generation is not secure [37]. OTP generation based on fingerprints is a good scheme but is costly because it requires a special hardware; thus, the method cannot be applied in small- and medium-scale projects [12]. The most popular OTP generation method is HOTP algorithm based on hash function SHA-1. This method is a cornerstone of initiative for open authentication (OATH), it was published as information IETF RFC 4226 in December 2005[38]. However, studies conducted in 2010 showed the weakness of the hash function [36]. Time-based OTP algorithm is also utilized widely in various fields [39]. However, server authentication and the user token must be maintained at the same time; otherwise, user authentication would fail [7]. 3. PROPOSED SYSTEM The problem related to OTP security is resolved in this study by leveraging existing communication infrastructures. The main contribution of this study is the creation of a new algorithm that generates an OTP based on behavioral biometrics and other unique factors. In addition, the security of the mobile holder is enhanced before the OTP is sent to the user. 3.1 Traditional Login Phase The User is prompted to log in after he completed his registration in the registration phase. In the registration phase, the user is asked to provide his information, such as username and password, IMEI, phone number, ID card number, PIN (symmetric key consisting of four to six numbers), address, and security question and answer. After the user provides his username and password in the login phase, he is transferred to another login phase responsible for checking who holds the mobile phone (is the mobile phone in the hands of its owner). 3.2 Checking Who Holds the Mobile Phone The user will not receive an OTP until the server confirms that the mobile phone is in the hand of the rightful owner. The proposed system requires each user to have a unique phone number, mobile device, and PIN. In this phase, the user is compelled to input his real phone number, real PIN (symmetric key for decrypt SMS that hold the OTP), and the IMEI number of his mobile device to receive the OTP because the server can verify who is holding the mobile phone through the IMEI number. After the user provides his information, the server checks the user's information with the user's information stored in the database. If the information matches, then the user is legitimate and the mobile device is in the right hands. The server then generates an OTP and encrypt and send it to the user by
3 International Journal of Computer Networks and Security, ISSN: , Vol.23, Issue SMS. If the user information do not match, the server will transfer the user to the first login phase (traditional login phase) as shown in Figure Generating OTP Mouse movements express the behavioral biometrics of users. As the user navigates a website, the server tracks the user's mouse movements through Xlib. Xlib is an X Windows system protocol. It contains functions that interact with an X server. The core of the X Windows system consists of a program called X, which runs on a machine. It follows the mouse movements, screen navigation, and pressing of the keyboard. It waits for the other programs to tell it what to do. When the user transfers from the traditional login phase to the confirmation phase (checking who holds the mobile phase), X begins to track mouse movements. However, data would not be saved in the database until the user confirms his information successfully. If the inputted information does not match the information in the database, the server will order X to discard the data. These data will not be saved in the database because the server will not give the order to generate an OTP (suspicious user). If the user confirms his information successfully, the server will save the data (mouse movements) in the database and utilize it to generate OTP. OTP generation depends on the various elements of the user's information and not just on the behavioral biometrics of the user. After the user confirms his information, the server gives the order to generate the OTP by combining the user's phone number (10 digits), IMEI (15 digits), PIN (4 to 6 digits), and mouse movements (coordinates X and Y). Six random numbers are obtained from the combination of elements (phone number, IMEI, PIN, and mouse movements). These random numbers represent the OTP. The user will not be provided the same OTP when he logs in at another time. An OTP is unpredictable because it is totally different from one user to another. If a user loses his cell phone, he can notify the system administrator to disable his account. A different user cannot utilize the stolen cell phone to authenticate himself in the system; he cannot impersonate the legal user (each user has a unique phone number, IMEI, and PIN) nor obtain an OTP. The impersonator must complete the process of authentication without being detected. When the impersonator attempts to enter the system as the legal user to legally register himself, the system can track the impersonator based on his information such as phone number, IMEI, and ID card number. If the user loses his cell phone after receiving an SMS (rare case because the OTP session is 10 minutes), the impersonator still cannot obtain an OTP because he must provide the symmetric key (PIN) for decrypt SMS that hold the OTP. The proposed system utilizes Rijndael AES 256 for encryption. The process of OTP generation is shown in Figure 2. After the user receives the encrypted message that holds the OTP, he is transferred to another screen where he is asked to prove the validity of his PIN and to decrypt the OTP. If the inputted PIN is wrong, the session will end. Figure1. Sequence Diagram of the system
4 International Journal of Computer Networks and Security, ISSN: , Vol.23, Issue COMPARISON AND ANALYSIS 4.1 Comparison and Analysis The performance of the proposed and existing OTP systems is compared and analyzed based on six performance evaluation elements, namely, non repudiation, block user s mobile phone, authenticate user and mobile phone, user's information reuse prevention, cell phone reuse prevention, and OTP security and ease of integration with the existing system Non-repudiation Because the proposed mechanism works to authenticate the user and his or her mobile phone (IMEI plus mobile number), so the proposed system has all important information about the user such as ID card number, mobile number, and IMEI, all of which are unique. Thus the proposed system can ensure the liability of the person that misuses the system Block User s Mobile The location of the mobile device can be determined through IMEI. The device can also be made unusable in any network or blacklisted. The proposed system requires IMEI to authenticate the user s device and to obtain necessary precautions in the event of system tampering. If the administrator of the proposed system discovers any attempts to tamper with the system he will be able to Figure 2. OTP generation cancel the user's account and block the user and his or her mobile device from registering in the system. While an existing OTP system cannot prevent the use of the same device, the illegal user can return to register himself (if the administrator discovers illegal attempts being carried out by the user) as a legal user to access the system Authenticate User & Mobile Phone Compared with other authentication systems which utilize mobile phone to generate OTPs or for receive SMS, these systems attempt to authenticate the user and neglect other parties which are used in the process of electronic authentication such as the user s mobile phone. However, the user is not the only party that needs to be authenticated to ensure the security of transactions on the Internet[40]. The proposed system works to authenticate both the user and mobile device, in addition to mutual authentication between the user and the server through a Secure Socket Layer (SSL) User's info Reuse Prevention The proposed system utilizes the OTP approach. Every user has a completely different set of information, which means there is no need to separate data as other systems. This method enhances privacy protection and minimizes the probability of data matching Cell Phone Reuse Prevention
5 International Journal of Computer Networks and Security, ISSN: , Vol.23, Issue The proposed system can prevent cell phones from being reused by others because the proposed system requires every user to possess unique phone and IMEI numbers. If the user s cell phone is lost or stolen, the thief cannot use it to access the system Secure OTP and easy to integrate with exist system The proposed method generates a more unpredictable OTP compared with existing methods that generate OTP based on time or password. The proposed system can be easily merged with existing systems and is less costly compared with OTP systems based on fingerprints. The generated OTP differs from one user to another and from time to time. In addition, the OTP is not sent directly to the user. The proposed system requires the user to prove his identity and the identity of the mobile device before receiving an SMS. SMS encryption is implemented with Rijndael AES 256 to increase OTP security. SMS is decrypted on the same Web site, and there is no need to install any software the in mobile device. 5. CONCLUSION A secure method for OTP generation is proposed in this paper. The proposed system can reinforce the security of authentication, and the mechanism guarantees nonrepudiation by authenticating the user and the device. The proposed system cannot ensure the proper use of the system; however, it can ensure that the user who misuses the system is made liable. Unlike existing systems, the mechanism of the proposed system requires the user to prove his identity and the identity of the mobile device. It utilizes a secure method to generate an OTP based on unique numbers and behavioral biometrics of the user. The proposed system enhances security by transferring the OTP to the trusted user. Therefore, the proposed system is suitable for fields where security is extremely important, including authentication in Internet banking, authentication in electronic payment, electronic government authentication, and cloud computing authentication. REFERENCES [1] Mijin Kim, et al., Weaknesses and Improvements of a One-time Password Authentication Scheme. Springer Link, : p [2] Miloš Milovanovic, et al., Choosing Authentication Techniques in e-procurement System in Serbia, in International Conference on Availability, Reliability and Security2010, IEEE Xplore. p [3] Chuan Yue and HAINING WANG, BogusBiter: A Transparent Protection Against Phishing Attacks. ACM, (2): p. 31. [4] Chun-Ying Huang, Shang-Pin Ma, and Kuan- TaChen, Using one-time passwords to prevent password phishing attacks. Science Direct, [5] Heng Yin, et al., Panorama: capturing system-wide information flow for malware detection and analysis, in ACM conference on Computer and communications security2007, ACM: USA. p [6] Scott Garriss, et al., Trustworthy and Personalized Computing on Public Kiosks, in 6th international conference on Mobile systems, applications, and services, 2008, ACM: USA. p [7] K.Aravindhan and R.R.Karthiga, One Time Password: A Survey. International Journal of Emerging Trends in Engineering and Development, (3): p [8] D.Parameswari and L.Jose, SET with SMS OTP using Two Factor Authentication. Journal of Computer Applications (JCA), (4): p. 4. [9] Fred Cheng, A Novel Rubbing Encryption Algorithm and The Implementation of a Web Based One-time Password Token. IEEEXplore, 2010: p [10] Jing-Chiou Liou and S. Bhashyam, On Improving Feasibility and Security Measures of Online Authentication. International Journal of Advancements in Computing Technology, (4.1): p. 11. [11] Mohammed Alzomai and Audun Jøsang, The Mobile Phone as a Multi OTP Device Using Trusted Computing in Fourth International Conference on Network and System Security (NSS)2010, IEEEXplore: Melbourne, VIC. p [12] ByungRae Cha and ChulWon Kim, Password Generation of OTP System using Fingerprint Features, in International Conference on Information Security and Assurance (ISA)2008, IEEEXplore: Busan,Korea p [13] Hyun-Chul Kim, et al., A Design of One-Time Password Mechanism using Public Key Infrastructure, in Fourth International Conference on Networked Computing and Advanced Information Management,2008, IEEEXplore: Gyeongju, Korea. p [14] Young Sil Lee, HyoTaek Lirn, and HoonJae Lee, A Study on Efficient OTP Generation using Stream Cipher with Random Digit, in 12th International Conference on Advanced Communication Technology (ICACT)2010, IEEEXplore: Phoenix Park,. p [15] Yu tao, F. and S. Gui ping, Design of Two-Way One- Time-Password Authentication Scheme Based on True Random Numbers, in Second International Workshop on Computer Science and Engineering2009, IEEEXplore: Qingdao. p [16] Gianluigi Me, Daniele Pirro, and R. Sarrecchia, A mobile based approach to strong authentication on Web, in International Multi-Conference on Computing in the Global Information Technology2006, IEEE Xplore. p. 67
6 International Journal of Computer Networks and Security, ISSN: , Vol.23, Issue [17] Havard Raddum, Lars Hopland Nestas, and K.J. Hole', Security Analysis of Mobile Phones Used as OTP Generators, in international conference on Information Security and Privacy of Pervasive Systems and Smart Devices,, International Federation for Information Processing (IFIP), Editor 2010, ACM: Berlin. p [18] Trupti Hemant Gurav and Manisha Dhage, Remote Client Authentication using Mobile phone generated OTP. International Journal of Scientific and Research Publications, (5): p. 4. [19] Parekh Tanvi, Gawshinde Sonal, and Sharma Mayank Kumar, Token Based Authentication using Mobile Phone, in International Conference on Communication Systems and Network Technologies (CSNT)2011, IEEEXplore: Katra, Jammu p [20] Steffen Hallsteinsen, Ivar Jørstad, and Do Van Thanh, Using the mobile phone as a security token for unified authentication, in Second International Conference on Systems and Networks Communications,2007, IEEEXplore: Cap Esterel. p. 68 [21] Xing Fang and J. Zhan, Online Banking Authentication Using Mobile Phones, in 5th International Conference on Future Information Technology (FutureTech),2010, IEEEXplore: Busan p [22] Hung-Min Sun, Yao-Hsin Chen, and Y.-H. Lin, opass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks. IEEEXplore, (2): p [23] Xing Fang and Justin Zhan, Online Banking Authentication Using Mobile Phones, in 5th International Conference on Future Information Technology (FutureTech),2010, IEEEXplore: Busan p. 1-5 [24] Mahendra Singh Bora and Amarjeet Singh, Cyber Threats and Security for Wireless Devices. Journal of Environmental Science, Computer Science and Engineering & Technology (JECET), : p [25] Lei Liu, et al. Exploitation and Threat Analysis of Open Mobile Devices. in 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems ACM. [26] GSM Association, IMEI Allocation and Approval Guidelines, Official Document TS.06 (DG06), Editor p. 33. [27] Jörg Eberspächer, et al., GSM Architecture, Protocols and Services 2009, John Wiley & Sons: UK. p [28] Angelos Yannopoulos, Vassiliki Andronikou, and Theodora Varvarigou, Behavioural Biometric Profiling and Ambient Intelligence, in Profiling the European Citizen: Cross-Disciplinary Perspectives2008, Springer Netherlands. p [29] Saurabh Singh and Dr. K.V.Arya, Mouse Interaction based Authentication System by Classifying the Distance Travelled by the Mouse. International Journal of Computer Applications, : p [30] Jing-Chiou Liou and Sujith Bhashyam, A feasible and cost effective two-factor authentication for online transactions, in 2nd International Conference of Software Engineering and Data Mining (SEDM)2010, IEEEXplore: Chengdu, China p [31] Harini Jagadee san and Michael S. Hsiao, A Novel Approach to Design of User Re-Authentication Systems in IEEE 3rd International Conference on Biometrics: Theory, Applications and Systems2009, IEEEXplore: Washington, USA. p [32] Nazirah Abd Hamid, Suhailan Safei, and Siti Dhalila Mohd Satar, Mouse Movement Behavioral Biometric Systems, in User Science and Engineering (i-user), 2011 International Conference2011, IEEEXplore. p [33] OWASP, OWASP TESTING GUIDE 2008, Open Web Application Security Project (OWASP). [34] Neng-Wen Wang and Yueh-Min Huang, User s Authentication in Media Services by using One-Time Password Authentication Scheme, in Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing2007, IEEEXplore: Kaohsiung p [35] Shuren Liao, et al., A unidirectional one-time password authentication scheme without counter desynchronization, in ISECS International Colloquium on Computing, Communication, Control, and Management2009, IEEEXplore: Sanya, China. p [36] Young Sil Lee, HyoTaek Lim, and HoonJae Lee, A Study on Efficient OTP Generation using Stream Cipher with Random Digit, in The 12th International Conference on Advanced Communication Technology (ICACT)2010, IEEEXplore: Phoenix Park,South Korea. p [37] Yang Jingbo and Shen Pingping, A secure strong password authentication protocol in 2nd International Conference on Software Technology and Engineering(ICSTE)2010, IEEEXplore: San Juan, PR p. V V2-357 [38] David M Raihi, et al., HOTP: An HMAC-Based One-Time Password Algorithm, 2005, Network Working Group. [39] David M Raihi, et al., TOTP: Time-Based One-Time Password Algorithm, REC, Editor p
7 International Journal of Computer Networks and Security, ISSN: , Vol.23, Issue [40] Audun Jøsang, et al., Service Provider Authentication Assurance, in Tenth Annual International Conference on Privacy, Security and Trust2012, IEEE Xplore. p
A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 7, July 2013, pg.396
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec TECHNOLOGY WHITEPAPER DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0 1 Motivation With the increasing
Second Level Authentication Using QR Codes
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 2 (2013), pp. 43-50 International Research Publication House http://www.irphouse.com Second Level Authentication
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing
M-Pass: Web Authentication Protocol Resistant to Malware and Phishing Ajinkya S. Yadav M.E.student, Department of Computer Engineering. Pune University, Pune A. K.Gupta Professor, Department of Computer
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
ViSolve Open Source Solutions
ViSolve Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services ViSolve Inc. ViSolve Securing Digital Assets Contents Security Overview Security Concerns Security Needs
International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA)
Issues and Challenges in Ensuring Trust, Security, Performance and Scalability in a Common Multi-Banking Solution Sree Rekha.G Research Assistant, CORI, PESIT, Bangalore. V.K.Agrawal, Director, CORI, PESIT,
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 [email protected], 2 [email protected]
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
Towards Securing E-Banking by an Integrated Service Model Utilizing Mobile Confirmation
Research Inventy: International Journal of Engineering And Science Vol.4, Issue 9 (Sept 2014), PP 26-30 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Towards Securing E-Banking by an
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
How CA Arcot Solutions Protect Against Internet Threats
TECHNOLOGY BRIEF How CA Arcot Solutions Protect Against Internet Threats How CA Arcot Solutions Protect Against Internet Threats we can table of contents executive summary 3 SECTION 1: CA ArcotID Security
A Method of Risk Assessment for Multi-Factor Authentication
Journal of Information Processing Systems, Vol.7, No.1, March 2011 DOI : 10.3745/JIPS.2011.7.1.187 A Method of Risk Assessment for Multi-Factor Authentication Jae-Jung Kim* and Seng-Phil Hong** Abstract
Securing mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
White Paper. The Principles of Tokenless Two-Factor Authentication
White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages
Authentication and Authorization Applications in 4G Networks
Authentication and Authorization Applications in 4G Networks Abstract Libor Dostálek [email protected] Faculty of Science University of South Bohemia Ceske Budejovice, Czech Republic The principle of
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Usable Multi-Factor Authentication and Risk- Based Authorization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Usable Multi-Factor Authentication and Risk- Based Authorization IBM T.J. Watson Research Center Larry Koved December 18, 2014 Team Profile
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
What the Future of Online Banking Authentication Could Be
Universal Banking Solution System Integration Consulting Business Process Outsourcing Banking on Internet and mobile is gaining popularity The Pew Internet & American Life Project Tracking survey of December
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings
Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
Hard vs. Soft Tokens Making the Right Choice for Security
Hard vs. Soft Tokens Making the Right Choice for Security HSTE-NB0012-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
A Study on User Access Control Method using Multi-Factor Authentication for EDMS
, pp.327-334 http://dx.doi.org/10.14257/ijsia.2013.7.6.33 A Study on User Access Control Method using Multi-Factor Authentication for EDMS Keunwang Lee 1* 1 Dept.of Multimedia Science, Chungwoon University
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Two Factor Authentication Using Smartphone Generated One Time Password
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 2 (May. - Jun. 2013), PP 85-90 Two Factor Authentication Using Smartphone Generated One Time Password
Advance Technique for Online Payment Security in E-Commerce : Double Verification
Advance Technique for Online Payment Security in E-Commerce : Double Verification Shilpa Research Scholar Shri Krishan Institute of Engineering & Technology, Kurukshetra University Kurukshetra, India [email protected]
