OTP Bidirectional Authentication Scheme Based on MAC Address

被引:0
作者
Xu, Jingai [1 ]
Qi, Jiang [1 ]
Ye, Xi [1 ]
机构
[1] WenZhou Med Univ, Infonnat & Engn Coll, Wenzhou 325035, Peoples R China
来源
2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC) | 2016年
关键词
dynamic password; identity authentication; software token; MAC address; IMEI; phishing site;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of Internet technology, the traditional static password based authentication solutions are no longer an adequate protection scheme to various enterprise applications. In this article, the principle of dynamic password technology is described, and the pros and cons of implementing dynamic password technology by software and hardware are analyzed as well. In addition, a dynamic password mutual authentication protocol base on MAC/IMEI of client is designed. The system architecture, authentication processes and safety measures are described and its security is also analyzed, which proves the high security features and wide application of such system. The new OTP scheme can be conveniently used and implemented with significant cost efficiency. It is mutual authentication and resistant to phishing attacks.
引用
收藏
页码:1148 / 1152
页数:5
相关论文
共 15 条
  • [1] Acharya S., 2013, IOSR Journal of Computer Engineering (IOSR-JCE), V11, P85, DOI DOI 10.9790/0661-1128590
  • [2] Alzomai M., 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P75, DOI 10.1109/NSS.2010.39
  • [3] Aravindhan K., 2013, International Journal of Emerging Trends in Engineering and Development, V1, P613
  • [4] Chawla M., 2014, Int. J. Comput. Appl., V93, P32
  • [5] Mobile one-time passwords: two-factor authentication using mobile phones
    Eldefrawy, Mohamed Hamdy
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    Kim, Tai-Hoon
    Elkamchouchi, Hassan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 508 - 516
  • [6] Using one-time passwords to prevent password phishing attacks
    Huang, Chun-Ying
    Ma, Shang-Pin
    Chen, Kuan-Ta
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1292 - 1301
  • [7] A new One-time Password Method
    Huang, Yun
    Huang, Zheng
    Zhao, Haoran
    Lai, Xuejia
    [J]. 2013 INTERNATIONAL CONFERENCE ON ELECTRONIC ENGINEERING AND COMPUTER SCIENCE (EECS 2013), 2013, 4 : 32 - 37
  • [8] Hussein Khalid Waleed, 2013, INT J COMPUTER NETWO, V23, P1138
  • [9] Kale Rahul, 2013, INT J INNOVATIVE RES, V2, P164
  • [10] Khan A.A., 2013, INT J COMPUT APPL, V68, P7