Web based Security with LOPass User Authentication Protocol in Mobile Application

被引:0
|
作者
Bhole, Ashish T. [1 ]
Chaudhari, Sheetal [1 ]
机构
[1] North Maharashtra Univ, SSBTs Coll Engn & Technol, Jalgaon, India
关键词
Web security; user authentication; long term password; one time password; LOPass;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today, the internet has became most convenient and widely used media for people exchanging information and doing business over the internet such as accessing web based emails, online auctions or banking sites. But nowadays, accessing the internet is faced with many challenges. One of the most important challenges is to ensure security with vital role to provide security in websites. The text passwords are convenient and simplest form for a user authentication on websites and this level is more prone to security attacks. User mostly uses theses weak passwords and it is often used across several websites. The reuse of the same password in untrusted websites causes password threats. Hackers invoke password stealing methods to grab password such as phishing, malware and keyloggers. Hereby we propose the user authentication protocol named LOPass which creates long term password and one time password for authenticating the user. It has three phases as registration, login and recovery phase. In LOPass, random password is generated for each login. Registration is used for the registration of the user. Recovery phase is used, if the user's mobile phone gets lost. The user needs to remember only his long term password which is secret.
引用
下载
收藏
页码:250 / 255
页数:6
相关论文
共 50 条
  • [21] Improvement on an optimized protocol for mobile network authentication and security
    Chang, CC
    Lee, JS
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 538 - 541
  • [22] Cryptanalysis of an optimized protocol for mobile network authentication and security
    Laih, CS
    Chiou, SY
    INFORMATION PROCESSING LETTERS, 2003, 85 (06) : 339 - 341
  • [23] Security Levels for Web Authentication Using Mobile Phones
    Vapen, Anna
    Shahmehri, Nahid
    PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2011, 352 : 130 - 143
  • [24] Design and Security Analysis of Mobile Identity Authentication Protocol
    Wang Qin
    Zhi Fenhe
    Ao Jinghai
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2645 - 2649
  • [25] Cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication
    Zhou, YB
    Zhang, ZF
    Feng, DG
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 372 - 374
  • [26] User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication
    Isler, Devris
    Kupcu, Alptekin
    Coskun, Aykut
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2019, 11737 : 99 - 117
  • [27] A new user authentication protocol for mobile terminals in wireless network
    Information Technology R and D Center, Mitsubishi Electric Corporation, Japan
    不详
    Proc. IEEE Int. Conf. Mobile Data Manage., (94-98):
  • [28] Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, Srinivasulu U.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1572 - 1595
  • [29] An Efficient Fingerprint-Based Remote User Authentication Protocol Using Mobile Devices
    Madhusudhan, R.
    Mittal, R. C.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 2, 2012, 131 : 569 - 578
  • [30] Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
    Manojkumar Vivekanandan
    Sastry V. N.
    Srinivasulu Reddy U.
    Peer-to-Peer Networking and Applications, 2021, 14 : 1572 - 1595