A Secured Two-Factor Authentication Protocol for One-Time Money Account

被引:0
|
作者
Sarang, Devidas [1 ]
Shekokar, Narendra [2 ]
机构
[1] YTCEM, Dept Comp Engn, Chandai, Raigad, India
[2] DJSCE, Dept Comp Engn, Mumbai, Maharashtra, India
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION, ICWICOM 2017 | 2018年 / 19卷
关键词
OTM (one-time money); VSA (virtual sub-account); ATM; Virtualization; Synchronization vulnerability;
D O I
10.1007/978-981-10-8339-6_4
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Credentials information stealing and online banking fraud are common problem in today's world. Two-factor authentications are used to overcome online banking frauds. But it can be easily broken by fraudster using different phishing techniques and synchronization vulnerabilities. These vulnerabilities weaken the security guarantees of smartphone based on two-factor authentication. Once authentication is broken fraudster has a direct online access of bank account with all access privileges. In this paper, we have attempted to minimize banking fraud by proposing OTM protocol for virtualization of bank account. Virtualization gives indirect and partial online access to bank account at the time of online financial transaction. OTM protocol derives virtual sub-accounts (VSA) from user bank account at the ATM machine using respective credit/debit card. Each virtual sub-account has assigned limit of maximum amount and used only one time for online banking.
引用
收藏
页码:29 / 38
页数:10
相关论文
共 50 条
  • [1] Mobile one-time passwords: two-factor authentication using mobile phones
    Eldefrawy, Mohamed Hamdy
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    Kim, Tai-Hoon
    Elkamchouchi, Hassan
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 508 - 516
  • [2] One-Time Password Generation and Two-Factor Authentication Using Molecules and Light
    Naren, Gaowa
    Li, Shiming
    Andreasson, Joakim
    CHEMPHYSCHEM, 2017, 18 (13) : 1726 - 1729
  • [3] Improvement of a security enhanced one-time two-factor authentication and key agreement scheme
    Xie, Qi
    SCIENTIA IRANICA, 2012, 19 (06) : 1856 - 1860
  • [4] Two-factor authentication for the Bitcoin protocol
    Christopher Mann
    Daniel Loebenberger
    International Journal of Information Security, 2017, 16 : 213 - 226
  • [5] Two-factor authentication for the Bitcoin protocol
    Mann, Christopher
    Loebenberger, Daniel
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (02) : 213 - 226
  • [6] Two-Factor Authentication for the Bitcoin Protocol
    Mann, Christopher
    Loebenberger, Daniel
    SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 155 - 171
  • [7] Two-factor remote authentication protocol and BAN Analysis
    Zhang, Lihua
    Bai, Erfei
    2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 411 - 414
  • [8] A Cloud Authentication Protocol using One-Time Pad
    Sim, Lexus Jun Hong
    Ren, Shu Qin
    Keoh, Sye Loong
    Aung, Khin Mi Mi
    PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2513 - 2516
  • [9] Two-Factor Authentication Scheme Using One Time Password in Cloud Computing
    El-sherif, Samar H.
    Abdel-kader, Rabab F.
    Rizk, Rawya Y.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2018, 2019, 845 : 425 - 434
  • [10] A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment
    Wang, Chenyu
    Xu, Guoai
    Li, Wenting
    SECURITY AND COMMUNICATION NETWORKS, 2018,