• DocumentCode
    3376284
  • Title

    CamAuth: Securing Web Authentication with Camera

  • Author

    Mengjun Xie ; Yanyan Li ; Yoshigoe, Kenji ; Seker, Remzi ; Jiang Bian

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Arkansas at Little Rock, Little Rock, AR, USA
  • fYear
    2015
  • fDate
    8-10 Jan. 2015
  • Firstpage
    232
  • Lastpage
    239
  • Abstract
    Frequent outbreak of password database leaks and server breaches in recent years manifests the aggravated security problems of web authentication using only password. Two-factor authentication, despite being more secure and strongly promoted, has not been widely applied to web authentication. Leveraging the unprecedented popularity of both personal mobile devices (e.g., Smartphones) and barcode scans through camera, we explore a new horizon in the design space of two-factor authentication. In this paper, we present CamAuth, a web authentication scheme that exploits pervasive mobile devices and digital cameras to counter various password attacks including man-in-the-middle and phishing attacks. In CamAuth, a mobile device is used as the second authentication factor to vouch for the identity of a use who is performing a web login from a PC. The device communicates directly with the PC through the secure visible light communication channels, which incurs no cellular cost and is immune to radio frequency attacks. CamAuth employs public-key cryptography to ensure the security of authentication process. We implemented a prototype system of CamAuth that consists of an Android application, a Chrome browser extension, and a Java-based web server. Our evaluation results indicate that CamAuth is a viable scheme for enhancing the security of web authentication.
  • Keywords
    Internet; authorisation; cameras; computer crime; message authentication; mobile computing; public key cryptography; smart phones; Android application; CamAuth; Chrome browser extension; Java-based Web server; Web authentication security; Web login; authentication process; barcode scans; database leaks; design space; digital cameras; man-in-the-middle attacks; password attacks; password outbreak; personal mobile devices; pervasive mobile devices; phishing attacks; public-key cryptography; radio frequency attacks; secure visible light communication channels; security problems; server breaches; smartphones; two-factor authentication; user identity; Authentication; Browsers; DH-HEMTs; Servers; Smart phones;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    High Assurance Systems Engineering (HASE), 2015 IEEE 16th International Symposium on
  • Conference_Location
    Daytona Beach Shores, FL
  • Print_ISBN
    978-1-4799-8110-6
  • Type

    conf

  • DOI
    10.1109/HASE.2015.41
  • Filename
    7027436