Authentication and Transaction Verification Using QR Codes with a Mobile Device

被引:9
作者
Chow, Yang-Wai [1 ]
Susilo, Willy [1 ]
Yang, Guomin [1 ]
Au, Man Ho [2 ]
Wang, Cong [3 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW, Australia
[2] Hong Kong Polytech Univ, Dept Comp, Kowloon, Hong Kong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
来源
SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE | 2016年 / 10066卷
关键词
Authentication; Mobile device; One-Time-Password (OTP); QR code; Transaction-Authentication-Number (TAN); Transaction integrity; Transaction verification; PASSWORD AUTHENTICATION;
D O I
10.1007/978-3-319-49148-6_36
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
User authentication and the verification of online transactions that are performed on an untrusted computer or device is an important and challenging problem. This paper presents an approach to authentication and transaction verification using a trusted mobile device, equipped with a camera, in conjunction with QR codes. The mobile device does not require an active connection (e.g., Internet or cellular network), as the required information is obtained by the mobile device through its camera, i.e. solely via the visual channel. The proposed approach consists of an initial user authentication phase, which is followed by a transaction verification phase. The transaction verification phase provides a mechanism whereby important transactions have to be verified by both the user and the server. We describe the adversarial model to capture the possible attacks to the system. In addition, this paper analyzes the security of the propose scheme, and discusses the practical issues and mechanisms by which the scheme is able to circumvent a variety of security threats including password stealing, man-in-the-middle and man-in-the-browser attacks. We note that our technique is applicable to many practical applications ranging from standard user authentication implementations to protecting online banking transactions.
引用
收藏
页码:437 / 451
页数:15
相关论文
共 27 条
[1]  
Barkan E, 2006, LECT NOTES COMPUT SC, V3897, P1
[2]  
Bonneau J., 2012, 817 U CAMB COMP LAB
[3]   The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes [J].
Bonneau, Joseph ;
Herley, Cormac ;
van Oorschot, Paul C. ;
Stajano, Frank .
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, :553-567
[4]   Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing [J].
Chow, Yang-Wai ;
Susilo, Willy ;
Yang, Guomin ;
Phillips, James G. ;
Pranata, Ilung ;
Barmawi, Ari Moesriami .
INFORMATION SECURITY AND PRIVACY, PT I, 2016, 9722 :409-425
[5]   A Visual One-Time Password Authentication Scheme Using Mobile Devices [J].
Chow, Yang-Wai ;
Susilo, Willy ;
Au, Man Ho ;
Barmawi, Ari Moesriami .
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 :243-257
[6]  
Clarke D., 2002, Pervasive Computing. First International Conference, Pervasive 2002. Proceedings (Lecture Notes in Computer Science Vol.2414), P114
[7]  
DeFigueiredo D., IEEE SECUR PRIV
[8]  
Dmitrienko Alexandra, 2014, Intel Technology Journal, V18, P138
[9]  
Dodson B., 2012, SECURE CONSUMER FRIE, P17
[10]   A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony [J].
Dunkelman, Orr ;
Keller, Nathan ;
Shamir, Adi .
JOURNAL OF CRYPTOLOGY, 2014, 27 (04) :824-849