DocumentCode :
2498949
Title :
Cellular phone based web authentication system using 3-D encryption technique under stochastic framework
Author :
Gupta, Somsubhra ; Sengupta, Soham ; Bhattacharyya, Mainak ; Chattrejee, Sandip ; Sharma, Bishwajeet Sen
Author_Institution :
Dept. of Inf. Technol., JIS Coll. of Eng., Kalyani, India
fYear :
2009
fDate :
3-5 Nov. 2009
Firstpage :
1
Lastpage :
5
Abstract :
This paper presents an approach to a user authentication system for web applications using JME enabled cellular phone as an authentication token. Most of the existing web based user authentication systems use user IDs and passwords to authenticate users. However, since its inception, the internet has been the witness to increasing number of attacks resulting sensitive information like user IDs, passwords and credit card details being stolen from the users´ computer by a technique known as ´masquerading´. The most common attacks include phishing, spoofing, key-loggers and spy-wares with the aim of impersonating the user. Even if the authentication systems manage to protect communication channels with encryption methods and digital signatures, the information can directly be stolen from the user´s Computer Terminal. To provide users with all round protection against all such attacks, we propose a user authentication system the components of which are a Computer Terminal and a JME enabled cellular phone using parallel network channel along with segmentation and clustering. An encryption algorithm is used that takes the random challenge from the web server received via SMS in the cellular phone and encrypts it using the seed value and the login password. Then, the cipher text is returned to the server via an SMS from the cellular phone which in turn verifies the authenticity of the user from the server.
Keywords :
Internet; authorisation; cryptography; digital signatures; electronic messaging; pattern clustering; telephone sets; 3D encryption technique; JME enabled cellular phone; SMS application; Web application; authentication token; cellular phone based Web authentication system; cipher text; communication channel protection; digital signature; encryption algorithm; encryption method; key logger; masquerading technique; parallel network channel; pattern clustering; pattern segmentation; phishing method; spoofing method; spyware; stochastic framework; user ID; user impersonation; user password; Authentication; Cellular phones; Communication channels; Computer peripherals; Credit cards; Cryptography; Internet; Intrusion detection; Protection; Stochastic systems; Authentication; Cellular phone; Encryption; Security; Stochastic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet, 2009. AH-ICI 2009. First Asian Himalayas International Conference on
Conference_Location :
Kathmandu
Print_ISBN :
978-1-4244-4569-1
Electronic_ISBN :
978-1-4244-4570-7
Type :
conf
DOI :
10.1109/AHICI.2009.5340322
Filename :
5340322
Link To Document :
بازگشت