Securely Eradicating Cellular Dependency for E-Banking Applications
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 2
Abstract
Numerous applications are available on the Internet for the exchange of personal information and money. All these applications need to authenticate the users to confirm their legitimacy. Currently, the most commonly employed credentials include static passwords. But people tend to behave carelessly in choosing their passwords to avoid the burden of memorizing complex passwords. Such frail password habits are a severe threat to the various services available online especially electronic banking or e-banking. For eradicating the necessity of creating and managing passwords, a variety of solutions are prevalent, the traditional ones being the usage of One-Time-Password (OTP) that refers to a single session/transaction password. However, the majority of the OTP-based security solutions fail to satisfy the usability or scalability requirements and are quite vulnerable owing to their reliance on multiple communication channels. In this paper, the most reliable and adoptable solution which provides better security in online banking transactions is proposed. This is an initiative to eradicate the dependency on Global System for Mobile communication (GSM) that is the most popular means of sending the One-Time-Passwords to the users availing e-banking facilities.
Authors and Affiliations
Bisma Rasool Pampori, Tehseen Mehraj, Burhan Ul Islam Khan, Asifa Mehraj Baba, Zahoor Ahmad Najar
Satellite Image Enhancement using Wavelet-domain based on Singular Value Decomposition
Improving the quality of satellite images has been considered an essential field of research in remote sensing and computer vision. There are currently numerous techniques and algorithms used to achieve enhanced performa...
Data Mining for Engineering Schools
the supervision of the academic performance of engineering students is vital during an early stage of their curricula. Indeed, their grades in specific core/major courses as well as their cumulative General Point Average...
Proposed Hyperchaotic System for Image Encryption
This paper presents a new hyper chaos system based on Hénon and Logistic maps which provides characteristics of high capacity, security and efficiency. The Proposed hyper chaos system is employed to generate the key for...
A Distributed Framework for Content Search Using Small World Communities
The continuous growth of multimedia content available all over the web is raising the importance of a distributed framework for searching it. One of the important parameters in a distributed environment is system respons...
Energy Efficient Clustering Using Fixed Sink Mobility for Wireless Sensor Networks
In this research an efficient data gathering scheme is presented using mobile sink as data collector with Clustering as sensor organizer in a randomly organized sensors in sensing field for wireless sensor network. The s...