Web based Security with LOPass User Authentication Protocol in Mobile Application

被引:0
|
作者
Bhole, Ashish T. [1 ]
Chaudhari, Sheetal [1 ]
机构
[1] North Maharashtra Univ, SSBTs Coll Engn & Technol, Jalgaon, India
关键词
Web security; user authentication; long term password; one time password; LOPass;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today, the internet has became most convenient and widely used media for people exchanging information and doing business over the internet such as accessing web based emails, online auctions or banking sites. But nowadays, accessing the internet is faced with many challenges. One of the most important challenges is to ensure security with vital role to provide security in websites. The text passwords are convenient and simplest form for a user authentication on websites and this level is more prone to security attacks. User mostly uses theses weak passwords and it is often used across several websites. The reuse of the same password in untrusted websites causes password threats. Hackers invoke password stealing methods to grab password such as phishing, malware and keyloggers. Hereby we propose the user authentication protocol named LOPass which creates long term password and one time password for authenticating the user. It has three phases as registration, login and recovery phase. In LOPass, random password is generated for each login. Registration is used for the registration of the user. Recovery phase is used, if the user's mobile phone gets lost. The user needs to remember only his long term password which is secret.
引用
收藏
页码:250 / 255
页数:6
相关论文
共 50 条
  • [11] End-to-end security protocol for mobile communications with end-user identification/authentication
    Chang, CC
    Chen, KL
    Hwang, MS
    WIRELESS PERSONAL COMMUNICATIONS, 2004, 28 (02) : 95 - 106
  • [12] End-to-End Security Protocol for Mobile Communications with End-User Identification/Authentication
    Chin-Chen Chang
    Kuo-Lun Chen
    Min-Shiang Hwang
    Wireless Personal Communications, 2004, 28 : 95 - 106
  • [13] User perspective and security of a new mobile authentication method
    Laka, Pawel
    Mazurczyk, Wojciech
    TELECOMMUNICATION SYSTEMS, 2018, 69 (03) : 365 - 379
  • [14] User perspective and security of a new mobile authentication method
    Pawel Laka
    Wojciech Mazurczyk
    Telecommunication Systems, 2018, 69 : 365 - 379
  • [15] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 35 : 190 - 193
  • [16] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 59 : 190 - 193
  • [17] An Efficient Authentication Protocol with User Anonymity for Mobile Networks
    Li, Huixian
    Yang, Yafang
    Pang, Liaojun
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1842 - 1847
  • [18] A hybrid user authentication protocol for mobile IPTV service
    Soo-Cheol Kim
    Sang-Soo Yeo
    Sung Kwon Kim
    Multimedia Tools and Applications, 2013, 65 : 283 - 296
  • [19] A Secure User Authentication Protocol for Heterogeneous Mobile Environments
    Hassan, Alzubair
    Hamza, Rafik
    Li, Fagen
    Ali, Awad
    Bashir, Mohammed Bakri
    Alqhtani, Samar M.
    Tawfeeg, Tawfeeg Mohmmed
    Yousif, Adil
    IEEE ACCESS, 2022, 10 : 69757 - 69770
  • [20] A hybrid user authentication protocol for mobile IPTV service
    Kim, Soo-Cheol
    Yeo, Sang-Soo
    Kim, Sung Kwon
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 65 (02) : 283 - 296