Web based Security with LOPass User Authentication Protocol in Mobile Application

被引:0
|
作者
Bhole, Ashish T. [1 ]
Chaudhari, Sheetal [1 ]
机构
[1] North Maharashtra Univ, SSBTs Coll Engn & Technol, Jalgaon, India
关键词
Web security; user authentication; long term password; one time password; LOPass;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today, the internet has became most convenient and widely used media for people exchanging information and doing business over the internet such as accessing web based emails, online auctions or banking sites. But nowadays, accessing the internet is faced with many challenges. One of the most important challenges is to ensure security with vital role to provide security in websites. The text passwords are convenient and simplest form for a user authentication on websites and this level is more prone to security attacks. User mostly uses theses weak passwords and it is often used across several websites. The reuse of the same password in untrusted websites causes password threats. Hackers invoke password stealing methods to grab password such as phishing, malware and keyloggers. Hereby we propose the user authentication protocol named LOPass which creates long term password and one time password for authenticating the user. It has three phases as registration, login and recovery phase. In LOPass, random password is generated for each login. Registration is used for the registration of the user. Recovery phase is used, if the user's mobile phone gets lost. The user needs to remember only his long term password which is secret.
引用
下载
收藏
页码:250 / 255
页数:6
相关论文
共 50 条
  • [1] Web Based Security Analysis of OPASS Authentication Schemes using Mobile Application
    Rama, M.
    Raja, S. Selvakumar
    2013 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN VLSI, EMBEDDED SYSTEM, NANO ELECTRONICS AND TELECOMMUNICATION SYSTEM (ICEVENT 2013), 2013,
  • [2] Biometric based User Authentication Protocol for Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasalu
    2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
  • [3] User Authentication Protocol Based on the Location Factor for a Mobile Environment
    Bartlomiejczyk, Maciej
    El Fray, Imed
    Kurkowski, Miroslaw
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    IEEE ACCESS, 2022, 10 : 16439 - 16455
  • [4] Password-based user authentication protocol for mobile environment
    Moon, Sung-Won
    Kim, Young-Gab
    Moon, Chang-Joo
    Baik, Doo-Kwon
    Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 743 - 753
  • [5] Security Analysis of Robust User Authentication Protocol
    Pura, Mihai-Lica
    Patriciu, Victor-Valeriu
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
  • [6] MOBILE-BASED CONTINUOUS USER AUTHENTICATION SYSTEM FOR CLOUD SECURITY
    Li, Qing
    Wang, Le
    Kim, TaeGuen
    Im, Eul Gyu
    PROCEEDINGS OF 2016 5TH IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2016), 2016, : 176 - 179
  • [7] Agent Tag Based User Authentication Protocol for Mobile IPTV Service
    Kim, Soo-Cheol
    Cho, Jung-Sik
    Kim, Sung Kwon
    2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [8] AcousAuth: An acoustic-based mobile Application for user authentication
    Chen, Si
    Li, Muyuan
    Qin, Zhan
    Zhang, Bingsheng
    Ren, Kui
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 215 - 216
  • [9] AN EXTENDED CERTIFICATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS
    Lee, Cheng-Chi
    Liao, I-En
    Hwang, Min-Shiang
    INFORMATION TECHNOLOGY AND CONTROL, 2009, 38 (01): : 61 - 66
  • [10] Edwards curves based security authentication protocol for mobile RFID systems
    Yang, Yu-Long
    Peng, Chang-Gen
    Zhou, Zhou
    Zhang, Xiao-Pei
    Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 132 - 138