SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
1 | P a g e
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME
USING CHALLENGE-RESPONSE AND QUICK RESPONSE CODE
Ganesh Kumar Mahato
Department of Computer engineering
Savitribhai Phule Pune University G.H.Raisoni College of Engineering and Management, Chas, Ahmednagar, India
gk6970@gmail.com
Sharma Kishan S.
Department of Computer engineering
Savitribhai Phule Pune University G.H.Raisoni College of Engineering and Management, Chas, Ahmednagar, India
shramak8976@gmail.com
Kurkure Shreyasi S.
Department of Computer engineering
Savitribhai Phule Pune University G.H.Raisoni College of Engineering and Management, Chas, Ahmednagar, India
shreyasi.kurkure@gmail.com
ABSTRACT
Quick Response (QR) code are 2D (two dimension) matrix code. Here it is use for secure authentication. Now days
Internet is most commonlyused medium to access the information. People are using many website like online
banking, insurance, shopping etc. these websites requires the strong authentication. Using a pair of username and
password authentication scheme is not secure enough since attacker can collect information from web phishing and
computer infection. Various malware or intended programs attempt to capture the confidential information from
personal computer. Therefore, secure authentication scheme is required. Many authentication methods have been
developed such as one time password, SMS base OTP system and some using bio-metric feature. Some of these
authentications are fail due to network problem and increases the cost. People are increasingly used in all life fields,
especially with the wide spread of Android smart phones which are used as QR-code scanners .In this paper, we
propose a anti phishing single sign-on (SSO) authentication model using QR-code. This authentication scheme is
secure against phishing attack and even on the distrusted computer environment. Quick Response (QR) Code can
store large amount of encrypted data, and it also has error correction ability.QR-code which would be scanned by
user mobile device and enter their password in mobile and again generate a QR-code in user mobile that QR-code
would be scanners by webcam. For encryption and decryption we have used AES (Advanced Encryption Standard)
algorithm and data unique at client side like IMEI number of the client android mobile device.
INTRODUCTION
An authentication method is proposed using two- factor authentication: mobile as one token and the challenge
response method using quick response code. A Quick Response code is a two dimensional matrix code. It can store
large amount of encrypted data, and it also has error correction ability.Inspite of massive use of current online
banking system, it has many security loopholes as it’s based on traditional password model, there is non-mutual
authentication between user and bank server which leads to threats like phishing (stealing passwords and use of
them for transactions), decoding communication lines, database hacking, etc.. To make transactions more secure but
also keeping them easy for user, the proposed authentication system can be useful. Authentication is nothing but the
process for identifying the person and providing the access to the system based on the identity of the person. The
most commonly used method is static username and password. Remembering the password for many sites becomes
difficult. There are different static and dynamic password systems, smart card based system, biometric, Kerberos,
etc. used for authentication. The web attacks, malware attack, have increased. While accessing the information on
the web, using an application on the network, public pc are insecure and for the physical access of the system the
important issue is the security and authorization. The main aim of the authentication is to increase the identity,
validity of the user and not to allow unauthorized access to the system. Challenge-response is used to protect
phishing attacks and faster QR code generation.
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
2 | P a g e
BACKGROUND
DETAILS OF THE METHODS:-
REQUESTFROM UNTRUSTED COMPUTER
∑ User tries to access the finance website through untrusted local computer.
∑ User Types in the Client Id and clicks on submit button
WEB SERVER VERIFICATION PHASE 1
∑ Web server redirects user to extended authentication with Session ID, User Id and Server Info.
∑ The web server verifies the Server Info. If verification fails, then the request is assumed to be invalid and
session aborts.
INFORMATION EXCHANGE PHASE
∑ The web server generates a random nonce to avoid tracking by adversary.
∑ The web server concatenates OpenID, Server Info and random nonce, and encrypts it with shared secret
key.
∑ The server generates a QRCode with the encrypted data and time stamp and sends to desktop computer.
∑ User Scans the QRCode using his/her Mobile device, and then decrypts the data using shared secret key.
Thus mobile device acquires the information; OpenID and Serverlnfo, and random nonce.
∑ User types in the password in Mobile device generates a random nonce and then user inputs the password
on the mobile device.
∑ Mobile device encrypts OpenID, shared data, Password, and User Rand using shared key, and then creates
a QR code with the encrypted data.
∑ Once the QRCode is generated on phone, it is transferred again to Untrusted PC.
LOGIN FROM UNTRUSTED PC - WEB SERVER VERIFICATION PHASE 2
∑ User enters the QRCode and clicks on login
∑ User gets the site home page
∑ If the same QRCode is used from different machine it is invalidated by the server
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
3 | P a g e
Figure 1 :-Flow of authnetication
TABLE 1:- SHOWS THE PARAMETERS IN OUR SCHEME.
Parameters Descriptions
Open id User fill URL in browser.
Client id User identifier
Session id A session Identifier
Random number Random key[Generated by
server]
Time Stamp Generating time for QR code
IMEI For identification purpose
Parameters
1. Open id
2. Client id
3. Session id
4. Random No
5. Time Stamp
1. Read QR code
2. Decrypt QR data
3. Match server
side parameters
and new QR code
parameters
(If password
matched
thenautomatically
login)
1. Read QR code
2. Decrypt QR data
3. Match imei number
(If imei matched then
ask for password)
Enter Open id
Check user is exist
or not
Generate QR code with
encrypted parameter
Append password with
existing parameters.
Scan new QR code
by webcam on pc
A Mobile based Anti-Phishing Authentication Scheme using QR code
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
4 | P a g e
LITERATURE SURVEY
1. Ms. Dhanashree Patil; Mrs. Shanti. K. Guru, “Secured Authentication using Challenge-Response and
Quick-Response Code for Android Mobiles”
They presented that, Today Internet is the most widely used medium for accessing the information. On the internet,
many websites are available for providing the information and also most of the services are getting Online such
banking, insurance, shopping etc. These services providing websites requires the strong authentication. Multiple
authentication methods have been developed such smart card based system, one time password, SMS based OTP
system and some using biometric features .Some of these authentication systems require hardware devices, and this
increases the cost. Users also have their accounts at many web sites, and they have to remember passwords of all
these sites. To make the access easier, many websites support the concept of federated identity management, in
which the user having a single account can log on to the other websites by authenticating themselves to a single
identity provider. Android smart phones are getting more popular. In this paper, a system is proposed for secured
authentication using Challenge Response, Quick Response Code, the identity provider and mobile phone, the most
commonly used device. A Quick Response code is a two dimensional matrix code. It can store large amount of
encrypted data, and it also has error correction ability.
2. Yung-Wei Kao, Guo-Heng Luo, Hsien-Tang Lin;Yu-Kai Huang, Shyan-
Ming Yuan,“Physical Access Control Based on QR Code”
This paper is also an authentication system based One Time Password technique(OTP) and using QR code. The
design consists of one server which stores the user information, mobile application that receives the mms and
regenerates the QR code, and this QR code is shown to the client PC having camera for getting authenticated. The
QR code contains the one time password that is send by the server.
3. Mukhopadhyay S., Argles, D.,“An Anti-Phishing mechanism for single sign-on based on QR-code”
This paper presented that, today internet users use a single identity to access multiple services. With single sign-on
(SSO), users don’t have to remember separate username password for each service provider, which helps the user to
browse through the web seamlessly. SSO is however susceptible to phishing attacks. This paper describes a new
anti-phishing SSO model based on mobile QR code. Apart from preventing phishing attacks this new model is also
safe against man in the middle and reply attacks. Internet is becoming more and more user centric each day. With
the advent of web 2.0 internet users are becoming more inclined to use services from multiple content and service
providers (CSP or SP). Most SPs provide user registration service whereby a user can create his/her own account
and maintain it. As such a user has to maintain separate user accounts (username and password) for each of the SPs
he/she uses. A study shows that today a typical user needs to maintain about twenty five different accounts which
require password and uses eight of them in a given day. Not only is this approach annoying to the user, it also raises
some serious security questions, e.g. password fatigue.
4. Pei-Yu Lin , Yi-Hui Chen , Eric Jui-Lin Lu and Ping-Jung Chen,“SecretHiding Mechanism Using QR
Barcode”
We propose QR code is the commonly used two-dimensional (2D) barcode recently with the advantages of larger
QR content and error correction capability.
Based on the error correction property of QR code, we designed a secret hiding technique for QR barcode. The
proposed scheme can conceal the secret data into the cover QR code without distorting the readability of QR
content. That is, general browsers can read the QR content from the marked QR code for the sake of reducing
attention. Only the authorized receiver can encrypt and retrieve the secret from the marked QR code. The secret
payload of the designed scheme is adjustable. The scheme can convey larger secret into a QR code according to the
selection of the QR version and the error correction level. The simulations demonstrate that the designed scheme is
efficient and low computational complexity. The mechanism can be applied to the QR reader and mobile phone.
5. H. C. Huang, F. C. Chang and W. C. Fang,“Reversible data hiding with histogram-based difference
expansion for QR Code applications”
In this paper, we propose a new algorithm in reversible data hiding, with the application associated with the quick
response (QR) codes. QR codes are random patterns, which can be commonly observed on the corner of posters or
webpages. The goal of QR codes aims at convenience oriented Applications for mobile phone users. People can use
the mobile phone cameras to capture QR code at the corner of web page, and then the hyperlink corresponding to the
QR code can be accessed instantly. Since QR code looks like random noise and it occupies a corner of the original
image, its existence can greatly reduce the value of the original content. Thus, how to retain the value of original
image, while keeping the capability for the instant access for webpages, would be the major concern of this paper.
With the aid of our reversible data hiding technique, the QR codes can be hidden into the original image, and
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
5 | P a g e
considerable increase in embedding capacity can be expected. Next, we propose a scheme such that when the image
containing the QR code is browsed, the hyperlink corresponding to the QR code is accessed first. Then, the QR code
could get vanished and the original image would be recovered to retain the information conveyed therein.
Simulation results demonstrate the applicability of the proposed algorithm.
CONCLUSION
Security has become extremely important in the digital Market. Authentication methods should be seriously
considered by services that store confidential information. Most of the users have android smart phones. These
Smart phones have good processing power and memory size. As a mobile phone has become an indispensable
accessory and carry-on device in real life, compared with the traditional key or access card, sending the
authentication image by using mobile phones through MMS(Multimedia Messaging Service) allows the user to
carry fewer objects and no extra specific hardware cost needed. So some security features can be deployed on them
in order to identify a user to the service provider. Using QR Code successful authentication can be done. The use of
QR code image for authentication makes it difficult to be accessed.
REFERENCES
[1] Ms. Dhanashree Patil; Mrs. Shanti. K. Guru “Secured Authentication using Challenge - Response and
Quick-Response Code for Android Mobiles ISBNNo.978-1-4799-3834-6/14, ICICES2014
[2] Yung-Wei Kao, Guo-Heng Luo; Hsien-Tang Lin;Yu-Kai Huang, Shyan-Ming Yuan, “Physical Access
Control Based on QR Code,” Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), vol., no.,
pp.285,288,10- 12Oct. 2011
[3] Mukhopadhyay S., Argles, D., “An Anti-Phishing mechanism for single signon Based on QR-code,”
Information Society (i-Society), vol., no., pp.505,508, 27-29 June 2011 IEEE
[4] H. C. Huang, F. C. Chang and W. C. Fang, “Reversible data hiding withhistogram-based difference
expansion for QR Code applications,” IEEE Transactions on Consumer Electronics, vol.,57, no. 2, pp. 779-787,
2011
[5] Jaideep Murkute, Hemant Nagpure, Harshal Kute, Neha Mohadikar, Chaitali Devade “Online Banking
Authentication System Using QR-code and Mobile OTP” Vol. 3, Issue 2, March -April 2013, pp.1810-1815 IJERA.

Mais conteúdo relacionado

Mais procurados

Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformaticsijtsrd
 
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...IJERA Editor
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...cscpconf
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airportsRexcy
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPijtsrd
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsBayalagmaa Davaanyam
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 

Mais procurados (19)

Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Sms based otp
Sms based otpSms based otp
Sms based otp
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
Modern Method for Detecting Web Phishing Using Visual Cryp-tography (VC) and ...
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
120 i143
120 i143120 i143
120 i143
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...CloudPass – a passport system based on Cloud Computing and Near Field Communi...
CloudPass – a passport system based on Cloud Computing and Near Field Communi...
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTP
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
A011140104
A011140104A011140104
A011140104
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 

Semelhante a A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE AND QUICK RESPONSE CODE

A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemIRJET Journal
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for BankingIRJET Journal
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance systemIJECEIAES
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPIRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobileUvaraj Shan
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesUvaraj Shan
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Ivona M
 

Semelhante a A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE AND QUICK RESPONSE CODE (20)

A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
D0351022026
D0351022026D0351022026
D0351022026
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
Gresham Publication
Gresham PublicationGresham Publication
Gresham Publication
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
Two aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devicesTwo aspect authentication system using secure mobile devices
Two aspect authentication system using secure mobile devices
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
 

Mais de ijiert bestjournal

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMPijiert bestjournal
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...ijiert bestjournal
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFijiert bestjournal
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINEijiert bestjournal
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY ijiert bestjournal
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINijiert bestjournal
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ijiert bestjournal
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...ijiert bestjournal
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...ijiert bestjournal
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR ijiert bestjournal
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTijiert bestjournal
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ijiert bestjournal
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTijiert bestjournal
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH ijiert bestjournal
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW ijiert bestjournal
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSijiert bestjournal
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ijiert bestjournal
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...ijiert bestjournal
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...ijiert bestjournal
 

Mais de ijiert bestjournal (20)

CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
CRACKS IN STEEL CASTING FOR VOLUTE CASING OF A PUMP
 
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...
 
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFCOMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAF
 
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
POWER GENERATION BY DIFFUSER AUGMENTED WIND TURBINE
 
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY
 
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINREVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAIN
 
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...
 
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
SCUDERI SPLIT CYCLE ENGINE: REVOLUTIONARY TECHNOLOGY & EVOLUTIONARY DESIGN RE...
 
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...
 
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR
 
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTDESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFT
 
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...
 
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTHEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENT
 
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH
 
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW
 
DESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERSDESIGN OF WELDING FIXTURES AND POSITIONERS
DESIGN OF WELDING FIXTURES AND POSITIONERS
 
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...
 
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...
 
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...
 
MAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHINGMAGNETIC ABRASIVE FINISHING
MAGNETIC ABRASIVE FINISHING
 

Último

Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier Fernández Muñoz
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptNoman khan
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 

Último (20)

Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptx
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).ppt
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 

A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE AND QUICK RESPONSE CODE

  • 1. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 1 | P a g e A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE AND QUICK RESPONSE CODE Ganesh Kumar Mahato Department of Computer engineering Savitribhai Phule Pune University G.H.Raisoni College of Engineering and Management, Chas, Ahmednagar, India gk6970@gmail.com Sharma Kishan S. Department of Computer engineering Savitribhai Phule Pune University G.H.Raisoni College of Engineering and Management, Chas, Ahmednagar, India shramak8976@gmail.com Kurkure Shreyasi S. Department of Computer engineering Savitribhai Phule Pune University G.H.Raisoni College of Engineering and Management, Chas, Ahmednagar, India shreyasi.kurkure@gmail.com ABSTRACT Quick Response (QR) code are 2D (two dimension) matrix code. Here it is use for secure authentication. Now days Internet is most commonlyused medium to access the information. People are using many website like online banking, insurance, shopping etc. these websites requires the strong authentication. Using a pair of username and password authentication scheme is not secure enough since attacker can collect information from web phishing and computer infection. Various malware or intended programs attempt to capture the confidential information from personal computer. Therefore, secure authentication scheme is required. Many authentication methods have been developed such as one time password, SMS base OTP system and some using bio-metric feature. Some of these authentications are fail due to network problem and increases the cost. People are increasingly used in all life fields, especially with the wide spread of Android smart phones which are used as QR-code scanners .In this paper, we propose a anti phishing single sign-on (SSO) authentication model using QR-code. This authentication scheme is secure against phishing attack and even on the distrusted computer environment. Quick Response (QR) Code can store large amount of encrypted data, and it also has error correction ability.QR-code which would be scanned by user mobile device and enter their password in mobile and again generate a QR-code in user mobile that QR-code would be scanners by webcam. For encryption and decryption we have used AES (Advanced Encryption Standard) algorithm and data unique at client side like IMEI number of the client android mobile device. INTRODUCTION An authentication method is proposed using two- factor authentication: mobile as one token and the challenge response method using quick response code. A Quick Response code is a two dimensional matrix code. It can store large amount of encrypted data, and it also has error correction ability.Inspite of massive use of current online banking system, it has many security loopholes as it’s based on traditional password model, there is non-mutual authentication between user and bank server which leads to threats like phishing (stealing passwords and use of them for transactions), decoding communication lines, database hacking, etc.. To make transactions more secure but also keeping them easy for user, the proposed authentication system can be useful. Authentication is nothing but the process for identifying the person and providing the access to the system based on the identity of the person. The most commonly used method is static username and password. Remembering the password for many sites becomes difficult. There are different static and dynamic password systems, smart card based system, biometric, Kerberos, etc. used for authentication. The web attacks, malware attack, have increased. While accessing the information on the web, using an application on the network, public pc are insecure and for the physical access of the system the important issue is the security and authorization. The main aim of the authentication is to increase the identity, validity of the user and not to allow unauthorized access to the system. Challenge-response is used to protect phishing attacks and faster QR code generation.
  • 2. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 2 | P a g e BACKGROUND DETAILS OF THE METHODS:- REQUESTFROM UNTRUSTED COMPUTER ∑ User tries to access the finance website through untrusted local computer. ∑ User Types in the Client Id and clicks on submit button WEB SERVER VERIFICATION PHASE 1 ∑ Web server redirects user to extended authentication with Session ID, User Id and Server Info. ∑ The web server verifies the Server Info. If verification fails, then the request is assumed to be invalid and session aborts. INFORMATION EXCHANGE PHASE ∑ The web server generates a random nonce to avoid tracking by adversary. ∑ The web server concatenates OpenID, Server Info and random nonce, and encrypts it with shared secret key. ∑ The server generates a QRCode with the encrypted data and time stamp and sends to desktop computer. ∑ User Scans the QRCode using his/her Mobile device, and then decrypts the data using shared secret key. Thus mobile device acquires the information; OpenID and Serverlnfo, and random nonce. ∑ User types in the password in Mobile device generates a random nonce and then user inputs the password on the mobile device. ∑ Mobile device encrypts OpenID, shared data, Password, and User Rand using shared key, and then creates a QR code with the encrypted data. ∑ Once the QRCode is generated on phone, it is transferred again to Untrusted PC. LOGIN FROM UNTRUSTED PC - WEB SERVER VERIFICATION PHASE 2 ∑ User enters the QRCode and clicks on login ∑ User gets the site home page ∑ If the same QRCode is used from different machine it is invalidated by the server
  • 3. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 3 | P a g e Figure 1 :-Flow of authnetication TABLE 1:- SHOWS THE PARAMETERS IN OUR SCHEME. Parameters Descriptions Open id User fill URL in browser. Client id User identifier Session id A session Identifier Random number Random key[Generated by server] Time Stamp Generating time for QR code IMEI For identification purpose Parameters 1. Open id 2. Client id 3. Session id 4. Random No 5. Time Stamp 1. Read QR code 2. Decrypt QR data 3. Match server side parameters and new QR code parameters (If password matched thenautomatically login) 1. Read QR code 2. Decrypt QR data 3. Match imei number (If imei matched then ask for password) Enter Open id Check user is exist or not Generate QR code with encrypted parameter Append password with existing parameters. Scan new QR code by webcam on pc A Mobile based Anti-Phishing Authentication Scheme using QR code
  • 4. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 4 | P a g e LITERATURE SURVEY 1. Ms. Dhanashree Patil; Mrs. Shanti. K. Guru, “Secured Authentication using Challenge-Response and Quick-Response Code for Android Mobiles” They presented that, Today Internet is the most widely used medium for accessing the information. On the internet, many websites are available for providing the information and also most of the services are getting Online such banking, insurance, shopping etc. These services providing websites requires the strong authentication. Multiple authentication methods have been developed such smart card based system, one time password, SMS based OTP system and some using biometric features .Some of these authentication systems require hardware devices, and this increases the cost. Users also have their accounts at many web sites, and they have to remember passwords of all these sites. To make the access easier, many websites support the concept of federated identity management, in which the user having a single account can log on to the other websites by authenticating themselves to a single identity provider. Android smart phones are getting more popular. In this paper, a system is proposed for secured authentication using Challenge Response, Quick Response Code, the identity provider and mobile phone, the most commonly used device. A Quick Response code is a two dimensional matrix code. It can store large amount of encrypted data, and it also has error correction ability. 2. Yung-Wei Kao, Guo-Heng Luo, Hsien-Tang Lin;Yu-Kai Huang, Shyan- Ming Yuan,“Physical Access Control Based on QR Code” This paper is also an authentication system based One Time Password technique(OTP) and using QR code. The design consists of one server which stores the user information, mobile application that receives the mms and regenerates the QR code, and this QR code is shown to the client PC having camera for getting authenticated. The QR code contains the one time password that is send by the server. 3. Mukhopadhyay S., Argles, D.,“An Anti-Phishing mechanism for single sign-on based on QR-code” This paper presented that, today internet users use a single identity to access multiple services. With single sign-on (SSO), users don’t have to remember separate username password for each service provider, which helps the user to browse through the web seamlessly. SSO is however susceptible to phishing attacks. This paper describes a new anti-phishing SSO model based on mobile QR code. Apart from preventing phishing attacks this new model is also safe against man in the middle and reply attacks. Internet is becoming more and more user centric each day. With the advent of web 2.0 internet users are becoming more inclined to use services from multiple content and service providers (CSP or SP). Most SPs provide user registration service whereby a user can create his/her own account and maintain it. As such a user has to maintain separate user accounts (username and password) for each of the SPs he/she uses. A study shows that today a typical user needs to maintain about twenty five different accounts which require password and uses eight of them in a given day. Not only is this approach annoying to the user, it also raises some serious security questions, e.g. password fatigue. 4. Pei-Yu Lin , Yi-Hui Chen , Eric Jui-Lin Lu and Ping-Jung Chen,“SecretHiding Mechanism Using QR Barcode” We propose QR code is the commonly used two-dimensional (2D) barcode recently with the advantages of larger QR content and error correction capability. Based on the error correction property of QR code, we designed a secret hiding technique for QR barcode. The proposed scheme can conceal the secret data into the cover QR code without distorting the readability of QR content. That is, general browsers can read the QR content from the marked QR code for the sake of reducing attention. Only the authorized receiver can encrypt and retrieve the secret from the marked QR code. The secret payload of the designed scheme is adjustable. The scheme can convey larger secret into a QR code according to the selection of the QR version and the error correction level. The simulations demonstrate that the designed scheme is efficient and low computational complexity. The mechanism can be applied to the QR reader and mobile phone. 5. H. C. Huang, F. C. Chang and W. C. Fang,“Reversible data hiding with histogram-based difference expansion for QR Code applications” In this paper, we propose a new algorithm in reversible data hiding, with the application associated with the quick response (QR) codes. QR codes are random patterns, which can be commonly observed on the corner of posters or webpages. The goal of QR codes aims at convenience oriented Applications for mobile phone users. People can use the mobile phone cameras to capture QR code at the corner of web page, and then the hyperlink corresponding to the QR code can be accessed instantly. Since QR code looks like random noise and it occupies a corner of the original image, its existence can greatly reduce the value of the original content. Thus, how to retain the value of original image, while keeping the capability for the instant access for webpages, would be the major concern of this paper. With the aid of our reversible data hiding technique, the QR codes can be hidden into the original image, and
  • 5. Novateur Publication’s International Journal of Innovation in Engineering, Research and Technology [IJIERT] ICITDCEME’15 Conference Proceedings ISSN No - 2394-3696 5 | P a g e considerable increase in embedding capacity can be expected. Next, we propose a scheme such that when the image containing the QR code is browsed, the hyperlink corresponding to the QR code is accessed first. Then, the QR code could get vanished and the original image would be recovered to retain the information conveyed therein. Simulation results demonstrate the applicability of the proposed algorithm. CONCLUSION Security has become extremely important in the digital Market. Authentication methods should be seriously considered by services that store confidential information. Most of the users have android smart phones. These Smart phones have good processing power and memory size. As a mobile phone has become an indispensable accessory and carry-on device in real life, compared with the traditional key or access card, sending the authentication image by using mobile phones through MMS(Multimedia Messaging Service) allows the user to carry fewer objects and no extra specific hardware cost needed. So some security features can be deployed on them in order to identify a user to the service provider. Using QR Code successful authentication can be done. The use of QR code image for authentication makes it difficult to be accessed. REFERENCES [1] Ms. Dhanashree Patil; Mrs. Shanti. K. Guru “Secured Authentication using Challenge - Response and Quick-Response Code for Android Mobiles ISBNNo.978-1-4799-3834-6/14, ICICES2014 [2] Yung-Wei Kao, Guo-Heng Luo; Hsien-Tang Lin;Yu-Kai Huang, Shyan-Ming Yuan, “Physical Access Control Based on QR Code,” Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), vol., no., pp.285,288,10- 12Oct. 2011 [3] Mukhopadhyay S., Argles, D., “An Anti-Phishing mechanism for single signon Based on QR-code,” Information Society (i-Society), vol., no., pp.505,508, 27-29 June 2011 IEEE [4] H. C. Huang, F. C. Chang and W. C. Fang, “Reversible data hiding withhistogram-based difference expansion for QR Code applications,” IEEE Transactions on Consumer Electronics, vol.,57, no. 2, pp. 779-787, 2011 [5] Jaideep Murkute, Hemant Nagpure, Harshal Kute, Neha Mohadikar, Chaitali Devade “Online Banking Authentication System Using QR-code and Mobile OTP” Vol. 3, Issue 2, March -April 2013, pp.1810-1815 IJERA.