Secure Internet Banking With Visual Authentication Protocols
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Keylogging is an activity of capturing users’ keyboard strokes and records the activity of a computer user in a covert manner using keylogger hardware and software. The keyloggers secretly monitors and log all keystrokes. Unlike other malicious programs, keyloggers do not cause any threat to system. But it can be used to intercept passwords and other confidential information entered via the keyboard by considering various rootkits residing in PCs (Personnel Computers) that breaches the security. Cyber criminals can get user names, email passwords, PIN codes, account numbers, email addresses, passwords to online gaming accounts, e-payment systems, etc. As a result, it impersonates a user during authentication in financial transactions. To prevent keylogging, the strict authentication is required. The QR code can be used to design the visual authentication protocols to achieve high usability and security. The two authentication protocols are Time based One-Time-Password protocol and Password-based authentication protocol. Through accurate analysis, the protocols are proved to be robust to several authentication attacks. And also by deploying these two protocols in real-world applications especially in online transactions, the strict security requirements can be satisfied.
Authors and Affiliations
Vishrut Sharma, C Jawahar Sandeep, Nikhil Katariya, Aruna. P
slugPerformance Improvement of Ad-Hoc Networks Using Multi-Interface Multi-Channel Mac and Routing Protocols
IEEE 802.11 MAC standard allocates single channel, single interface to each node in the case of wireless ad-hoc networks, as a default behavior of this protocol. The same feature of single channel, single interface per...
Voice Assistance for Visually Impaired People Using Natural Language Processing
As the use of mobile devices is expanding and affecting various aspects of human life, the number and smartphone users is dramatically increasing. Consequently, the robustness of interaction between smartphone and human...
Paper-Based Screen-Printed Multi-Band Monopole Antenna for Wireless Application
In this paper, we proposed design of a photo paper-based multiband antenna using screen-printing technology. The Ushape slots are achieving multiband operation of various frequencies. The antenna is fabricated through a...
Comparison of Experimental and Analytical Methods of Obtaining Stability Lobe Diagram for High Speed Machining Processes – A Review
Chatter is a complicated problem faced by machine tool operators. Chatter is a self-excited vibration that can occur during machining operations. This is an undesirable phenomenon which limits the productivity of the ma...
Agriculture Information Extraction Using Data Analytics in Weka
With the development of PC based information stockpiling frameworks we have gone over a gigantic measure of storehouse of information. In any case, this information is not extremely accommodating until we realize what w...