Web based Security with LOPass User Authentication Protocol in Mobile Application

被引:0
|
作者
Bhole, Ashish T. [1 ]
Chaudhari, Sheetal [1 ]
机构
[1] North Maharashtra Univ, SSBTs Coll Engn & Technol, Jalgaon, India
关键词
Web security; user authentication; long term password; one time password; LOPass;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today, the internet has became most convenient and widely used media for people exchanging information and doing business over the internet such as accessing web based emails, online auctions or banking sites. But nowadays, accessing the internet is faced with many challenges. One of the most important challenges is to ensure security with vital role to provide security in websites. The text passwords are convenient and simplest form for a user authentication on websites and this level is more prone to security attacks. User mostly uses theses weak passwords and it is often used across several websites. The reuse of the same password in untrusted websites causes password threats. Hackers invoke password stealing methods to grab password such as phishing, malware and keyloggers. Hereby we propose the user authentication protocol named LOPass which creates long term password and one time password for authenticating the user. It has three phases as registration, login and recovery phase. In LOPass, random password is generated for each login. Registration is used for the registration of the user. Recovery phase is used, if the user's mobile phone gets lost. The user needs to remember only his long term password which is secret.
引用
下载
收藏
页码:250 / 255
页数:6
相关论文
共 50 条
  • [31] Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
    Moon, Jongho
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [32] Cyber-security trust model through adaptive cloud authentication protocol for web application
    Alsuwat, Hatim
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (04)
  • [33] Category-Based Graphical User Authentication (CGUA) Scheme for Web Application
    Osman, Mohd Zamri
    Ithnin, Norafida
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 315 - 326
  • [34] A Security Architecture Based on User Authentication of Bluetooth
    Xin, Yu
    Ting, Yan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 627 - +
  • [35] An ECC Based Remote User Authentication Protocol
    Shafiq, Akasha
    Altaf, Izwa
    Mahmood, Khalid
    Kumari, Saru
    Chen, Chien-Ming
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01): : 285 - 294
  • [36] PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones
    Gunasinghe, Hasini
    Bertino, Elisa
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (04) : 1042 - 1057
  • [37] A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment
    Kim, Hakjae
    Oh, Ryong
    Lee, Sungju
    Kim, Taesup
    Lee, Sangjoon
    Chung, Yongwha
    Cho, Choongho
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1098 - 1107
  • [38] On the Security of a Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks
    Liu, Shuangshuang
    Lee, Zhiyuan
    Chen, Lili
    Wu, Tsu-Yang
    Chen, Chien-Ming
    ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING (ECC 2021), 2022, 268 : 319 - 326
  • [39] Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor Networks
    Maurya, Anup Kumar
    Sastry, V. N.
    Udgata, Siba Kumar
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 134 - 145
  • [40] Security analysis and improvement of a user-friendly remote authentication protocol
    Wang, YJ
    Li, JH
    Tie, L
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 47 - 50