Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725

Similar documents
Internet Banking Two-Factor Authentication using Smartphones

A SECURE COMMUNICATION IN SMART PHONES USING TWO FACTOR AUTHENTICATIONS

Two Factor Authentication Using Smartphone Generated One Time Password

Multi Factor Authentication Using Mobile Phones

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

THE FUTURE OF MOBILE SECURITY

One Time Password Generation for Multifactor Authentication using Graphical Password

International Journal of Software and Web Sciences (IJSWS)

Protected Cash Withdrawal in Atm Using Mobile Phone

RFID Based Real Time Password Authentication System for ATM

Authentication using Mixed-mode approach.

T. Venkat Narayana Rao et al IJCSET October 2011 Vol 1, Issue 9,

INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme

An Approach towards Security in Private Cloud Using OTP

IDRBT Working Paper No. 11 Authentication factors for Internet banking

SURVEY ON ONE TIME PASSWORD

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

2CAuth: A New Two Factor Authentication Scheme Using QR-Code

Economic and Social Council

White Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007

Android Based Total Security for System Authentication

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Entrust IdentityGuard

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

How Secure is your Authentication Technology?

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

Enhancing Totp Protocol By Embedding Current Gps Location

Security Levels for Web Authentication using Mobile Phones

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

A secure login system using virtual password

A Study on Secure Electronic Medical DB System in Hospital Environment

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

A brief on Two-Factor Authentication

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

Advanced Authentication

Research Article. Research of network payment system based on multi-factor authentication

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Convenience and security

Proven. Trusted.

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security Levels for Web Authentication Using Mobile Phones

A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION

Final Year Project Interim Report

Using Foundstone CookieDigger to Analyze Web Session Management

Second Level Authentication Using QR Codes

Two-Factor Authentication and Swivel

An Analysis of Twitter s App Based Two- Factor Authentication and Recovery System

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Dynamic Query Updation for User Authentication in cloud Environment

Improving Online Security with Strong, Personalized User Authentication

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

LAN Monitoring Using Android Phone

Firmware security features in HP Compaq business notebooks

Towards Improving Usability of Authentication Systems Using Smartphones for Logical and Physical Resource Access in a Single Sign-On Environment

One Time Pad Encryption The unbreakable encryption method

Integration of Sound Signature in 3D Password Authentication System

The Security Behind Sticky Password

ABSTRACT I. INTRODUCTION

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns

ATM Transaction Security Using Fingerprint/OTP

Chip and PIN: two-factor authentication

Draft Technical Specifications for Multilevel Security Authentication Device

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

Two-Factor Authentication: Tailor-Made for SMS

Electronic Commerce and E-wallet

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Journal of Electronic Banking Systems

Application Design and Development

Enhanced Model of SQL Injection Detecting and Prevention

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

The Encryption Technology of Automatic Teller Machine Networks

Remote Access Securing Your Employees Out of the Office

A puzzle based authentication method with server monitoring

e-banking in Nepal Prepared by: Prabal Khanal Sanima Development Financial Institution (Development Bank) Kathmandu, Nepal

YubiKey Integration for Full Disk Encryption

A Study on User Access Control Method using Multi-Factor Authentication for EDMS

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle

An Innovative Two Factor Authentication Method: The QRLogin System

Ultra-strong authentication to protect network access and assets

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

Wireless Local Area. Network Security

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

VISA card holders can directly contact the account issuing bank about Verified by VISA to make your credit care even more secure.

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"

An Efficient Windows Cardspace identity Management Technique in Cloud Computing

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Single Sign-On Secure Authentication Password Mechanism

A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model

Ciphermail Gateway PDF Encryption Setup Guide

Secure Data Exchange Solution

Frequently Asked Questions (FAQ) on HSBC Chip Credit Cards

The deployment of OHMS TM. in private cloud

Transcription:

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering University of Pune, Maharashtra, India Abstract: In this paper we describe the methods for implementing connectionless approach for stronger authentication. This connectionless approach includes the two factor authentication using mobile phone (Android). The main purpose of this method is to provide the stronger authentication in online transaction. Mobile phone is used for the purpose of generation of OTP. It improves the security of Internet payments by providing an additional password to the user. Using the password the user can successfully make his payment. Online card transactions over Internet need enhanced security. Secure processing system facilitates additional security by way of a cardholder-chosen password, which is known only to the cardholder. Dynamic password authentication is one solution that uses the added security of credit cards to offer better protection against online fraud. The primary benefit of this system is the reduction in disputed transactions and the resultant exception handling expense and losses. Thus the proposed system is adding an extra layer of security at the point where you enter information online. The service helps to prevent unauthorized online use before it happens by confirming your identity with an additional password. Keywords- One Time Password (OTP); Connectionless,; Authentication; Security; Transaction; Random String; Two factor Authentication, Personal Identification Number(PIN).

1. Introduction: In these days most of systems are rely on the Static password, such passwords are vulnerable for attack. Users tend to use easy-to-guess passwords, use the same password in multiple accounts, write the passwords or store them on their machines, etc.[1] Furthermore, hackers have the option of using many techniques to steal passwords such as shoulder surfing, snooping, sniffing, guessing, etc. Today use of mobile phones is increased beyond just calling or texting. Mobile connectivity options have also increased. After standard GSM connections, mobile phones now have infra-red, Bluetooth, 3G, and WLAN connectivity. We are using the mobile phone for generating the One Time Password (OTP) [2][4]. OTP generating application is developed for Android based mobile phones. We developed two factor authentication system using mobile phone(android) it consist of two modes connection oriented and connectionless. Connection oriented is e-mail and SMS based, it is more expensive. Connectionless approach for android based mobile phones which is easy to use, secure and cheap. In the next section we described background about authentication factor, existing system. Section III described proposed system. Section IV described algorithm of system. In Section V described about system analysis. Section V concludes the paper. 1.1.How OTP is generated at client side? We are using android based mobile phone for the generation of OTP. Where user has to enter the predefined attributes value such as user id, date of birth and ATM pin no. mobiles IMSI no. and current date and time is automatically retrieved by the inbuilt function of application. And using this parameter an OTP is generated. Time is one the main factor in this process where it gets changed regularly. 1.2.How Secure is our generated OTP? We are using SHA1 algorithm to generate the one time password. SHA1 is basically a secure hash algorithm that works with input less than 2^64 bits in length. Output generated by SHA1 algorithm is 160 bits. It is more secure than MD5 algorithm. It gives a fix length of output. Here we get 20 bytes of string i.e. 160 bits. 20 bytes gives 40 characters. It is very hectic task to enter those 40 characters for that we divide that 20 bytes into 4 chunks each of 5 bytes & perform XOR operation on that chunks. Which gives us output of 5 bytes i.e. 10 characters. These 10 characters are final secrete key known as generated One Time Password (OTP). International Journal of Innovative Research and Studies Page 165

Figure 1 2. Background: Authentication is done to identify whether person is genuine or not if she/he is genuine then grant the access of system otherwise denied it. There are three universally recognized factors for authentication exist today are: what you know (e.g. passwords, PIN s), what you have (e.g. debit card or credit card), and what you are (e.g. figure prints, face recognition, biometrics, etc.). Two factor authentications [1][2][4]. is a mechanism which implements two of the above mentioned factors and is therefore considered stronger and more secure than the traditionally implemented one factor authentication system. One of the examples of two factor authentication includes withdrawing money from an ATM machine. When someone wants to draw money from the ATM, first he\she has to input his\her ATM card i.e. what you have and again he\she has to enter the pin number i.e. what you know in order to access his\her account. Dynamic password authentication is one solution that uses the added security to offer better protection against online fraud [7]. The primary benefit of this system is the reduction in disputed transactions and the resultant exception handling expense and losses. The substantial proportion of customer complaints could be eliminated with the use of Authenticated Payment. This will have a positive impact on user profitability. To make online transaction even simpler and safer, a secure processing system is being introduced. Passwords are known to be an easiest target for hackers. For that banks are using tokens as a mean for two factor authentication. Tokens come in two formats: Hardware and Software. Hardware nothing but small device which are small and can be conveniently carried. E.g. ATM, Debit cards etc. Software tokens are PIN that changes with time. When user wants to authenticate to system at that time she/he uses that PIN. Such programs implement one time International Journal of Innovative Research and Studies Page 166

passwords (OTP) algorithm [1][2]. OTP algorithms are difficult to break, since unauthorized user should not able to guess next password in sequence. Factors that are used in OTP algorithms which include the unique information of user such as user id, DOB, time etc. 3. System Analysis: When the user transacts online, the existing system does not contain any additional password security. She/he does not provide any additional information for online payment. Proposed system involves the users to authenticate themselves using their personal mobile phones. The Two factor authentication using mobile phone system could not replace the existing authentication system, but instead serves as an added layer of security that protects and enriches the existing authentication system. 4. Proposed System: The proposed system allows user or customer to use a personal password to confirm his identity and providing greater reassurance and security. The proposed method guarantees that authenticating to systems, such as online banking. The proposed system involves a mobile phone for generating One Time Password. The generated password is valid for only short period of time and is generated by factors that are unique for both, server and mobile device itself. We proposed a secure, convenient and user friendly two factor authentication using mobile phone scheme and discusses its application to online banking. To meet the user requirements, the proposed system incorporates the following features: --In this proposed system specifically the example of online banking is taken to represent the online transaction. After the entering the details of transaction he user can select the mode of transaction connection oriented or connectionless. --After selecting connectionless mode of transaction, user will generate OTP on his/her android mobile phone. And providing that OTP to system to complete transaction. --When OTP is CORRECT i.e. generated on mobile phone and generated at server side are both match then transaction will be succeed otherwise it will be denied. --If user doesn t have android mobile phone then user will select the connection oriented system. Where OTP is directly send to user mobile phone by server. This OTP is any random string generated by server. International Journal of Innovative Research and Studies Page 167

5. System Design: Figure 2 1. Here first client visits to banks website to make transaction, Login using username and password. 2. If username and password are correct then bank grant the permission to client and user able to access his/her account. 3. Client fills all the transaction detail and proceeds to next page. 4. Here client choose the mode of transaction. i.e. Connectionless to generate own OTP or Connection oriented to ask server to send OTP on his/her mobile phone. 5. After selecting connectionless mode user generates his/her own OTP on their android based mobile phones. Using unique parameters such as User ID provided by bank, DOB, Your mobiles ISMI number, and ATM pin number and most important factor i.e. Date and Time. 6. Client use this OTP to complete their transaction. 7. As soon as OTP reach to the server, server starts generating OTP using same parameters available at server. If both OTP gets match then transaction will be completed otherwise it will be denied. International Journal of Innovative Research and Studies Page 168

6. Features: It is not depends upon users mobile network. It is easy to use, secure and cheap It could not replace the existing authentication system, but instead serves as an added layer of security that protects and enriches the existing authentication system. 7. Requirement Specification: 7.1.Software Requirements: Operating System : Windows 7 Language : JAVA Front End : Servlet/Swing Back End : MySQL Web server : Glassfish/Apache Tomcat Builder Tool : MyEclipse 7.2.Hardware Requirements: Main Processor : Intel Core 2 Duo Ram : 512 Mb Ram Mother Board : 945gvm Intel Chipset Hard Disk : 80GB Monitor : 17 Color Monitor Keyboard : Standard 102 Keys Mouse : Optical mouse 8. Conclusion: Two factor authentication systems is a user-friendly package and requires little prior knowledge of software The system is highly flexible and is well efficient to make easy interactions with the database. The proposed system has two option of running, either using a free and fast connection-less method or a more expensive SMSbased method. Both methods have been successfully implemented and tested, and shown to be robust and secure. The goal of computer security to maintain the integrity, availability and privacy of information entrusted to the system was successfully obtained. International Journal of Innovative Research and Studies Page 169

References: 1. Fadi Aloul, Syed Zahidi, Wassim El-Hajj, "Two Factor Authentication Using Mobile Phones" 2. Fadi Aloul1, Syed Zahidi1, Wasim El-Hajj2"Multi Factor Authentication Using Mobile Phones, International Journal of Mathematics and Computer Science, 4(2009), no. 2, 65 80 3. Anders Moen Hagalisletto, Arne Riiber, "Using the mobile phone in two-factor authentication". 4. Harish Dinne, Karthik Mandava "Two Way Mobile Authentication System"Master Thesis Electrical Engineering Thesis no: MSE-2004-xx June 2010. 5. Qinghua Li, Student Member, IEEE, and Guohong Cao, Fellow, IEEE "Multicast Authentication in the Smart Grid With One-Time Signature"IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011. 6. DATA SHEET Two-Factor Authentication Made Easy"www.duosecurity.com" 7. Tomáš Rosa "The Decline and Dawn of Two-Factor Authentication on Smart Phones", INFORMATION SECURITY SUMMIT 2012 8. B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, 2nd Edition 9. http:// www.en.wikipedia.org 10. http://www.javaworld.com 11. http://www.developer.com International Journal of Innovative Research and Studies Page 170