Secure Internet Banking With Visual Authentication Protocols
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Keylogging is an activity of capturing users’ keyboard strokes and records the activity of a computer user in a covert manner using keylogger hardware and software. The keyloggers secretly monitors and log all keystrokes. Unlike other malicious programs, keyloggers do not cause any threat to system. But it can be used to intercept passwords and other confidential information entered via the keyboard by considering various rootkits residing in PCs (Personnel Computers) that breaches the security. Cyber criminals can get user names, email passwords, PIN codes, account numbers, email addresses, passwords to online gaming accounts, e-payment systems, etc. As a result, it impersonates a user during authentication in financial transactions. To prevent keylogging, the strict authentication is required. The QR code can be used to design the visual authentication protocols to achieve high usability and security. The two authentication protocols are Time based One-Time-Password protocol and Password-based authentication protocol. Through accurate analysis, the protocols are proved to be robust to several authentication attacks. And also by deploying these two protocols in real-world applications especially in online transactions, the strict security requirements can be satisfied.
Authors and Affiliations
Vishrut Sharma, C Jawahar Sandeep, Nikhil Katariya, Aruna. P
Design and Development of Simulation Model for Plant Layout
The objective of this work is to research the attainable enhancements within the blanking plant layout that manufactures automotive elements. For this the systematic layout coming up with theory (SLP) is employed. durin...
Monopoly
Market is the most important place where seller and buyers meet each other and exchange commodity. In absence of market the economic growth of society goes down. Therefore a well-planned marketing is very important for...
Compact embedded system based locator, detector, and dimmer Red box
As many applications like vehicle tracking, alcohol detection, accident detection, automatic dimming of light is based on sensor technology and microcontroller using embedded programming it is impossible to bring all th...
Optimal Side Lobes Reduction of Linear Array Antenna Using Crow Search Algorithm
The aim of this paper is to introduce the novel metaheuristic crow search Optimization algorithm (CSA) to the electromagnetic and antenna community. Crow search algorithm is a population based method, mimicking the inte...
Biometric-A Fraud Reduction Technology in E-payment and its impact on Inclusive Growth of India
Inclusive growth is very important for the progress of developing nations and it is not possible without financial inclusion. Government has already given directives on financial inclusion and most Indian banks and othe...