OTP on Demand - An Embedded System for User Authentication

被引:0
|
作者
Janakiraman, Siva [1 ]
Sree, Kalavagunta Sowmya [1 ]
Manasa, V. Leela [1 ]
Rajagopalan, Sundararaman [1 ]
Thenmozhi, K. [1 ]
Amirtharajan, Rengarajan [1 ]
机构
[1] SASTRA Univ, Sch Elect & Elect Engn, Dept Elect & Commun Engn, Thanjavur 613401, Tamil Nadu, India
关键词
component; OTP; Embedded Security; Authentication; Microcontroller; Information Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security plays a vital role in the world of communication. In applications such as banking, making access to any personal resource of an individual via wireless media requires the validation of authorized user at every moment. Static passwords have been in use which is vulnerable to attacks such as reply attack. One Time Password (OTP) is a particular kind of password that is valid only for only one login session or transaction. OTP provides a secure way for user authentication as it becomes invalid when used beyond the prescribed time frame. High level of randomness is the significant property required for OTPs. True randomness can be generated from real-world parameters that can produce unpredictable variations in its output. This paper presents an embedded hardware OTP generation system based on remote request via DTMF signals. The proposed hardware uses a confluence of real-world parameters and software-based chaotic function on an embedded platform for OTP generation. The proposed system also facilitates change in the generation of OTPs via discretionary external inputs from users.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] OTT user authentication system by age classification
    Kim K.-Y.
    Park B.-J.
    Suh Y.
    Park J.
    Journal of Computer Virology and Hacking Techniques, 2016, 12 (03) : 169 - 175
  • [32] Biometric Authentication: System Security and User Privacy
    Jain, Anil K.
    Nandakumar, Karthik
    COMPUTER, 2012, 45 (11) : 87 - 92
  • [33] An Efficient Multistage Security System for User Authentication
    Gupta, Ashutosh
    Medhi, Prerna
    Pandey, Sujata
    Kumar, Pradeep
    Kumar, Saket
    Singh, H. P.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3194 - 3197
  • [34] Mobile user authentication system in cloud environment
    Yeh, Her-Tyan
    Chen, Bing-Chang
    Wu, Yi-Cong
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1161 - 1168
  • [35] Real time USER AUTHENTICATION system for PDA
    Yang, YC
    Wu, ZH
    Ma, ZY
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 439 - 443
  • [36] A Secure Usability Design System for User Authentication
    Olanrewaju, Ayannuga O.
    Olusegun, Folorunso
    Adio, Akinwale T.
    Asiribo, E. O.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 151 - 158
  • [37] User Authentication System using Visual Communication
    Oh, Byung-Hun
    Chang, Kyung-Won
    Hong, Kwang-Seok
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 269 - 278
  • [38] A Skeleton and Gesture Based User Authentication System
    Lee, Hsueh-Fan
    Lu, Yi-Shu
    Huang, Jiun-Long
    Hu, Chih-Lin
    2015 8TH INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING (UMEDIA) CONFERENCE PROCEEDINGS, 2015, : 254 - 258
  • [39] Design of user authentication system based on WPKI
    Lee, Cheol-seung
    Kim, Hyeong-gyun
    Lee, Joon
    2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 979 - 983
  • [40] VERIFYING THE AUTHENTICATION OF AN INFORMATION SYSTEM USER.
    Ahituv, Niv
    Lapid, Yeheskel
    Neumann, Seev
    Computers and Security, 1987, 6 (02): : 152 - 157