Secure Internet Banking With Visual Authentication Protocols

Abstract

Keylogging is an activity of capturing users’ keyboard strokes and records the activity of a computer user in a covert manner using keylogger hardware and software. The keyloggers secretly monitors and log all keystrokes. Unlike other malicious programs, keyloggers do not cause any threat to system. But it can be used to intercept passwords and other confidential information entered via the keyboard by considering various rootkits residing in PCs (Personnel Computers) that breaches the security. Cyber criminals can get user names, email passwords, PIN codes, account numbers, email addresses, passwords to online gaming accounts, e-payment systems, etc. As a result, it impersonates a user during authentication in financial transactions. To prevent keylogging, the strict authentication is required. The QR code can be used to design the visual authentication protocols to achieve high usability and security. The two authentication protocols are Time based One-Time-Password protocol and Password-based authentication protocol. Through accurate analysis, the protocols are proved to be robust to several authentication attacks. And also by deploying these two protocols in real-world applications especially in online transactions, the strict security requirements can be satisfied.

Authors and Affiliations

Vishrut Sharma, C Jawahar Sandeep, Nikhil Katariya, Aruna. P

Keywords

Related Articles

Design and Development of Simulation Model for Plant Layout

The objective of this work is to research the attainable enhancements within the blanking plant layout that manufactures automotive elements. For this the systematic layout coming up with theory (SLP) is employed. durin...

Monopoly

Market is the most important place where seller and buyers meet each other and exchange commodity. In absence of market the economic growth of society goes down. Therefore a well-planned marketing is very important for...

Compact embedded system based locator, detector, and dimmer Red box

As many applications like vehicle tracking, alcohol detection, accident detection, automatic dimming of light is based on sensor technology and microcontroller using embedded programming it is impossible to bring all th...

Optimal Side Lobes Reduction of Linear Array Antenna Using Crow Search Algorithm

The aim of this paper is to introduce the novel metaheuristic crow search Optimization algorithm (CSA) to the electromagnetic and antenna community. Crow search algorithm is a population based method, mimicking the inte...

Biometric-A Fraud Reduction Technology in E-payment and its impact on Inclusive Growth of India

Inclusive growth is very important for the progress of developing nations and it is not possible without financial inclusion. Government has already given directives on financial inclusion and most Indian banks and othe...

Download PDF file
  • EP ID EP20206
  • DOI -
  • Views 270
  • Downloads 5

How To Cite

Vishrut Sharma, C Jawahar Sandeep, Nikhil Katariya, Aruna. P (2015). Secure Internet Banking With Visual Authentication Protocols. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20206