User Authentication Mobile Phones Using Multi Factor Visual One-Time-Password

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 515

فایل این مقاله در 11 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICRSIE02_050

تاریخ نمایه سازی: 11 مرداد 1396

چکیده مقاله:

User authentication is a secure technique for accessing websites and can be of password-based, challenge-response and zero-knowledge types. Password-based authentication methods are categorized into fixed-password and one-time password methods. The traditional static or fixed-password methods are low-cost and simple, and are vulnerable to security attacks. In applications where security is a crucial factor, OTPs should be used. The OTP authentication methods are resistant to eavesdropping and stealing attacks, and are used in banking applications. Visual OTPs are used in this study for user authentication. The following stages are involved in the proposed method: the user visits a bank and provides the proof of purchase for his/her mobile phone and have his/her phone registered with a password. Additionally, the identification factors of the user are converted to encoded images through visual codes. The encoded image along with the static password is sent to a hash function to generate a OTP. The method uses several encryption factors to generate the OTPs and the encoded images. Use of several factors in visual codes increases their security.

نویسندگان

Mahsa Moradmand Ziabari

Faculty of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran

A Broumandnia

Islamic Azad University, South Tehran Branch,

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Young Sil Lee, Nack Hyun Kim, Hyotaek Lim, HeungKuk Jo, ...
  • Aloul F, Zahidi S, E1-Hajj _ Two factor authentication using ...
  • Aloul F, Zahidi S, E1-Hajj _ Multi factor authentication using ...
  • Kuan-Chieh Liao, Wei-Hsun Lee, Min-Hsuan Sung, Ting-Ching Lin. A OTP ...
  • Eldefrawy M.H., Alghathbar K., Khan M.K.. OTP-based two-factor authentication using ...
  • Eldefrawy M.H., Alghathbar K., Khan M.K., Kim T.H, Elkamchouchi H.. ...
  • Hallsteinsen S, Jorstad I, Do Van Thanh. Using the mobile ...
  • A.Forouzan B. Cryptography and Network Security. New York, McGrow-Hill, 752 ...
  • Lamport L. Password authentication with insecure _ ommunication _ _ ...
  • Eko Sediyono, Kartika Imam Santoso, Suhartono. Secure login by using ...
  • Borko Furht (2011). Handbook of Augmented Reality. Springer. p. 341. ...
  • Yung-Wei Kao, Guo-Heng Luo, Hsien-Tang Lin, Yu-Kai Huang, Shyan-Ming Yuan. ...
  • Denso Wave Incorporated. Information capacity and versions of QR code. ...
  • Xing F, Zhan J. Online banking authentication using mobile phones. ...
  • Dhanashree P, Shanti K. Guru. Secured authentication using challenge-re spOnSe ...
  • نمایش کامل مراجع