Securing SMS Based One Time Password Technique from Man in the Middle Attack

نویسندگان

  • Safa Hamdare
  • Varsha Nagpurkar
  • Jayashri Mittal
چکیده

Security of financial transactions in E-Commerce is difficult to implement and there is a risk that user’s confidential data over the internet may be accessed by hackers. Unfortunately, interacting with an online service such as a banking web application often requires certain degree of technical sophistication that not all Internet users possess. For the last couple of year such naive users have been increasingly targeted by phishing attacks that are launched by miscreants who are aiming to make an easy profit by means of illegal financial transactions. In this paper, we have proposed an idea for securing e-commerce transaction from phishing attack. An approach already exists where phishing attack is prevented using one time password which is sent on user’s registered mobile via SMS for authentication. But this method can be counter attacked by “Man in the Middle”. In our paper, a new idea is proposed which is more secure compared to the existing online payment system using OTP. In this mechanism OTP is combined with the secure key and is then passed through RSA algorithm to generate the Transaction password. A Copy of this password is maintained at the server side and is being generated at the user side using a mobile application; so that it is not transferred over the insecure network leading to a fraudulent transaction. Keywords—Phishing, Replay attack, MITM attack, RSA, Random Generator.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Sms for End-to-end Transmission Using Protocol in Wireless Networks

The information sent from one mobile to another mobile is called as SMS (Short Message Service). This SMS service is used in many applications such as healthcare monitoring, mobile banking, mobile commerce, and so on. The information may contain account number and password, but the traditional Cellular architecture system does not provide privacy for that information. For this reason we go for ...

متن کامل

Remark on the One-Time Password Authentication Protocol against Theft Attacks

Recently, Tsuji and Shimizu proposed a one-time password authentication protocol against replay and theft attacks to protect the stolen-verifier problem or other steal attacks on the Internet server. Unfortunately, in this paper, we show that their scheme is also insecure under the middle attack. Their scheme is also not secure under the middle attack. keywords: password authentication, one-tim...

متن کامل

The Role of Authentication Tokens in Preventing Man-in-the-Middle Attacks

Security threats and potential breaches can stem from a wide variety of vulnerabilities, ranging from simple password theft or spyware to Trojan horses, keyword sniffers and more. But the tactic that combines high levels of deception, great potential risk of loss and broad distribution is a new form of “man-in-themiddle” attack—real-time phishing. Man-in-the-middle attacks are not new—they’ve b...

متن کامل

A Simple Password Authentication Scheme Based on Geometric Hashing Function

Password authentication protocol is one of most important mechanisms to prevent resources from accessing by unauthorized users. Many password authentication schemes have been developed in last decades, and many of them are based on the use of smart card. However, nowadays it is not applicable for many applications on the Internet to adopt the smart card in their authentication scheme due to its...

متن کامل

A Novel Smart Card Authentication Scheme using Image Watermarking

One of the primary issues of information technology and communication is the security of information from unwanted frauds. For every transaction over insecure channel authentication is required. Since the rise of the Internet smart card authentication schemes have been widely used to avoid the problems related to traditional password based authentication schemes. However, most of the smart card...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1405.4828  شماره 

صفحات  -

تاریخ انتشار 2014