Detection of Phishing Attack Using Visual Cryptography in Ad hoc Network

被引:0
|
作者
Kumar, Vimal [1 ]
Kumar, Rakesh [1 ]
机构
[1] Madan Mohan Malaviya Univ Technol, Dept Comp Sci & Engn, Gorakhpur 273010, Uttar Pradesh, India
关键词
Phishing Attack; Visual Cryptography; Website; Authentication;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile ad hoc networks (MANETs) provide a wide range of applications such as disaster relief, military application, wireless sensor network (WSN), education, entrainment, health, commercial and civilian environments. One of its important applications is in commercial and civilian environments that cover e-commerce, vehicular services and networks of visitors at airports. Nowadays, phishing attacks are increasing with burgeoning rate for e-commerce websites. This paper provides a novel anti-phishing approach based on visual cryptography. According to this approach a user generates two shares of an image using (2, 2) visual cryptography scheme. Client stores the first share of this image and second share is uploaded to the website at the time of user registration. After this, website asks for some other information like second share of the image, user name, and password. These credentials of a particular user can change once per login. During each login phase, a user verifies the legitimacy of a website by getting secret information with the help of stacking both shares. There are many existing approaches based on cryptographic technique but they all suffer from False Positive notification. However, proposed approach does not suffer from False Positive (FP) notification and outperforms all existing approaches.
引用
收藏
页码:1021 / 1025
页数:5
相关论文
共 50 条
  • [1] Avoiding Phishing Attack on Online Votig System Using Visual Cryptography
    Rane, Saloni Sunil
    Phansalkar, Ketaki Adwait
    Shinde, Mayuri Yashvant
    Kazi, Atiya
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 135 - +
  • [2] Wormhole attack detection in ad hoc network using machine learning technique
    Prasad, Mahendra
    Tripathi, Sachin
    Dahal, Keshav
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [3] Sybil Attack Prevention and Detection in Vehicular Ad hoc Network
    Sharma, Aravendra Kumar
    Saroj, Sushil Kumar
    Chauhan, Sanjeev Kumar
    Saini, Sachin Kumar
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 594 - 599
  • [4] Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network
    Liu, Jun
    Chen, Huiting
    Zhen, Zhong
    Sha, Mingbo
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 147 - 154
  • [5] Network layer intrusion detection in mobile ad hoc network using on-demand attack detection protocol
    Duraipandian, M.
    Palanisamy, C.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (03) : 245 - 257
  • [6] A novel cryptography for ad hoc network security
    Pi Jian-yong
    Liu Xin-song
    Wu Ai
    Liu Dan
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1448 - +
  • [7] Detection of Black hole Attack in Mobile Ad hoc Network using Adaptive Approach
    Baghel, Lokesh
    Mishra, Prakash
    Samvatsar, Makrand
    Singh, Upendra
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 626 - 630
  • [8] An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network
    Kumar, Vimal
    Kumar, Rakesh
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 472 - 479
  • [9] Detection & Prevention of Sybil Attack in Ad hoc Network using Hybrid MAP & MAC Technique
    Lakhanpal, Rohit
    Sharma, Sangeeta
    2016 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY INFORMATION AND COMMUNICATION (ICCPEIC), 2016, : 283 - 287
  • [10] An Authentication Technique in Mobile Ad hoc Network using Elliptic Curve Cryptography
    Kumar, Rohit
    Shiv, Yashendra
    Kumar, Vimal
    Wairiya, Manoj
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 209 - 213