Web based Security with LOPass User Authentication Protocol in Mobile Application

被引:0
|
作者
Bhole, Ashish T. [1 ]
Chaudhari, Sheetal [1 ]
机构
[1] North Maharashtra Univ, SSBTs Coll Engn & Technol, Jalgaon, India
关键词
Web security; user authentication; long term password; one time password; LOPass;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today, the internet has became most convenient and widely used media for people exchanging information and doing business over the internet such as accessing web based emails, online auctions or banking sites. But nowadays, accessing the internet is faced with many challenges. One of the most important challenges is to ensure security with vital role to provide security in websites. The text passwords are convenient and simplest form for a user authentication on websites and this level is more prone to security attacks. User mostly uses theses weak passwords and it is often used across several websites. The reuse of the same password in untrusted websites causes password threats. Hackers invoke password stealing methods to grab password such as phishing, malware and keyloggers. Hereby we propose the user authentication protocol named LOPass which creates long term password and one time password for authenticating the user. It has three phases as registration, login and recovery phase. In LOPass, random password is generated for each login. Registration is used for the registration of the user. Recovery phase is used, if the user's mobile phone gets lost. The user needs to remember only his long term password which is secret.
引用
收藏
页码:250 / 255
页数:6
相关论文
共 50 条
  • [41] Security analysis and improvement of a user-friendly remote authentication protocol
    Wang, YJ
    Li, JH
    Tie, L
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 47 - 50
  • [42] Towards Implicit Enhancement of Security and User Authentication in Mobile Devices Based on Movement and Audio Analysis
    Ketabdar, Hamed
    Roshandel, Mehran
    Skripko, Daria
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER-HUMAN INTERACTIONS (ACHI 2011), 2011, : 188 - 191
  • [43] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [44] Java implementation of an authentication protocol with application on mobile phones
    Politehnica University of Timisoara, Faculty of Automatics and Computers, Romania
    不详
    IEEE Int. Conf. Autom., Qual. Test., Rob., AQTR - THETA Ed. - Proc., 2008, (190-194):
  • [45] Application of an improved authentication protocol in mobile electronic payment
    School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
    Beijing Jiaotong Daxue Xuebao, 2006, 5 (28-31):
  • [46] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    R. Madhusudhan
    Shashidhara R.
    Peer-to-Peer Networking and Applications, 2020, 13 : 82 - 103
  • [47] Efficient user authentication protocol for distributed multimedia mobile cloud environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasulu
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (05) : 1933 - 1956
  • [48] Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
    Madhusudhan, R.
    Shashidhara, R.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 82 - 103
  • [49] Evaluation of Secure OpenID-Based RAAA User Authentication Protocol for Preventing Specific Web Attacks in Web Apps
    Bilal, Muhammad
    Wang, Can
    Yu, Zhi
    Bashir, Abid
    PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020), 2020, : 82 - 90
  • [50] Evaluation of Secure OpenID-Based RAAA User Authentication Protocol for Preventing Specific Web Attacks in Web Apps
    Bilal, Muhammad
    Wang, Can
    Yu, Zhi
    Bashir, Abid
    Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2020, 2020-October : 82 - 90