scispace - formally typeset
Search or ask a question
Author

Humaira Dar

Bio: Humaira Dar is an academic researcher. The author has contributed to research in topics: Challenge–response authentication & Security service. The author has an hindex of 1, co-authored 1 publications receiving 3 citations.

Papers
More filters
01 Oct 2013
TL;DR: A technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security is proposed.
Abstract: Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. It has been seen that currently majority of the authentication and authorization techniques are usually designed on the top of One Time Password on user trusted hand held device. However, due to various lethal threats on mobile security systems, it can be said that existing security is not sufficient. Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security. Experimented on java platform, the implementation techniques discussed in the paper are found to be very robust

3 citations


Cited by
More filters
Proceedings ArticleDOI
01 Oct 2015
TL;DR: An overview of proposed secure authentication system which includes the authentication server, one-time password generator, and database server is given which provides several advantages with respect to most of the available solutions at the state of the art.
Abstract: Phishing is one of the most common attacks on the networks today and a primary enabler for fraud and identity theft, and the increasing sophistication of the phishers makes it very difficult for users to distinguish between genuine and fake. Thus, it is important to mutually authenticate each other. The mutual authentication between two entities is essential to establish a secure link over public/closed insecure networks. This paper gives an overview of proposed secure authentication system which includes the authentication server, one-time password generator, and database server. The system achieves mutual authentication by exchanging two one-time password (OTP) where OTP is a security mechanism, will be expired after single use/ some period of time and provides several advantages with respect to most of the available solutions at the state of the art. First, it enables transparent mutual authentication between two entities. Moreover, it guarantees authenticity of both entities within the same session. Finally, the proposed system ensures secure data transmission and protected access between two entities as well as to prevent from known attacks.

3 citations

Journal ArticleDOI
TL;DR: This paper introduces an approach to increase the security level by using multifactor authentication scheme, which requires the user to login with a username and password and gets the OTP generated by the system on his cell phone.
Abstract: As we know one factor authentication does not provide required security to a user while accessing the areas like banking, insurance, medical records etc. Users have to simply type a user name and password on the website So there is a need to increase the level of security for these users. This paper introduces an approach to increase the security level by using multifactor authentication scheme. This approach requires the user to login with a username and password. As the user enters his password, he will get the OTP generated by the system on his cell phone. We are integrating this approach with image based authentication and question based authentication. To develop this system we are using SHA algorithm and Lamport’s algorithm. By using these algorithms we can develop more secured multifactor authentication. We are using visual studio as the front end and My SQL as the back end. The results show a more secured system.

1 citations

Journal ArticleDOI
TL;DR: This paper presents an approach to further increase security using a two-factor authentication scheme that required the user to login with a username and password and also generate a One Time Password which will be sent to his email.
Abstract: Most people now access all the important areas of their life—banking, shopping, insurance, medical records, and so on—simply by sitting at their computer and typing a username and password into a website. Getting access to something this way is called one-factor authentication, because you need to know only one thing to get into the system: the combination of user name and password. In theory, this kind of protection should be reasonably secure; in practice, it's less and less trustworthy. This paper presents an approach to further increase security using a two-factor authentication scheme. This approach required the user to login with a username and password and also generate a One Time Password which will be sent to his email. The One Time Password will be used for authentication any time the user wishes to access a restricted resource. The one time password as the name implies will expire after a single use and after a period of 60 seconds. The system uses the HMACSHA-256 algorithm to develop a more secured two factor, one time password. Java Enterprise Edition (JEE) technology and MySQL was used and the frontend and backend respectively and was deployed on a single user computer using Java Bean Open Source Software (JBOSS) application server. The results from the system implementation show a more secured system difficult to compromise.