Securing Online Accounts via New Handshake Protocol and Granular Access Control
نویسندگان
چکیده
When we need to make informed financial decisions, we seek out tools to assist us with managing and aggregating our finances. Traditionally, money management software packages have been available for personal computers; however, they were expensive and often had steep learning curve. With a paradigm shift to cloud-computing users are looking toward the web for an easier and low-cost solution. As a result, third-party companies have been formed to fill this gap. However, users have to share their login credentials with the third-party, and if that information gets compromised, an attacker can access and perform transactions on their account. We present a novel, holistic model with a new handshake protocol and access control, which authenticates and forms a sandbox around a third-party access. When utilizing these novel techniques, users’ original login credentials can remain private, and no one would be able to perform transactions on the users’ account.
منابع مشابه
Enhancing Cyber Security of Online Accounts via a Novel Protocol and New Techniques
The financial world has gotten more sophisticated. People need to make informed financial decisions, so they seek out efficient tools to help them manage their finances. Traditionally, money management software has been available for individuals to use in their homes on their personal computers. These tools were a local install, often expensive, and required a learning curve to use them effecti...
متن کاملSecuring Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol
Computer communications have been playing a vital role in the world economy. Government organizations, large companies and banks are using those networks in trading their data. This imposed a challenge due to the increasing need for protecting the sensitive data traded over those networks. This research presents a mechanism to protect computers communication over open un-trusted networks, prima...
متن کاملMarch: a Medium Access Control Protocol for Multihop Wireless Ad Hoc Networks
The Multiple Access with Reduced Handshake ( M A R C H ) protocol utilizes the broadcast characteristics of an omnidirectional antenna t o reduce the number of control messages required t o transmit a data packet an multihop ad hoc networkx In MARCH, the RTS-CTS handshake i s used only by the first hop of a route t o forward data packets while for the rest i t utilizes a new CTS-only handshake....
متن کاملA WTLS Handshake Protocol against Active Attack
WTLS as a secure protocol of WAP makes TLS that is used in wireless Internet protocol for TCP security is appropriate to wireless environments [1][2]. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of four protocols, such as Handshake, ChangeCipherSpec, Alert, Application Data. In this paper we analyze properties of Handshake protocol and procedures of est...
متن کاملEvaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks
Medium Access Control (MAC) is an essential component of protocol stacks in Underwater Acoustic Networks (UANs). Numerous dedicated UAN MAC protocols have been proposed and studied via analysis and simulations. However, limited work has been done on evaluating these protocols in real ocean environments. To achieve a better understanding on how MAC protocols perform in real world UANs, we implem...
متن کامل