Securely Eradicating Cellular Dependency for E-Banking Applications
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 2
Abstract
Numerous applications are available on the Internet for the exchange of personal information and money. All these applications need to authenticate the users to confirm their legitimacy. Currently, the most commonly employed credentials include static passwords. But people tend to behave carelessly in choosing their passwords to avoid the burden of memorizing complex passwords. Such frail password habits are a severe threat to the various services available online especially electronic banking or e-banking. For eradicating the necessity of creating and managing passwords, a variety of solutions are prevalent, the traditional ones being the usage of One-Time-Password (OTP) that refers to a single session/transaction password. However, the majority of the OTP-based security solutions fail to satisfy the usability or scalability requirements and are quite vulnerable owing to their reliance on multiple communication channels. In this paper, the most reliable and adoptable solution which provides better security in online banking transactions is proposed. This is an initiative to eradicate the dependency on Global System for Mobile communication (GSM) that is the most popular means of sending the One-Time-Passwords to the users availing e-banking facilities.
Authors and Affiliations
Bisma Rasool Pampori, Tehseen Mehraj, Burhan Ul Islam Khan, Asifa Mehraj Baba, Zahoor Ahmad Najar
Brainstorming 2.0: Toward collaborative tool based on social networks
Social networks are part of Web 2.0 collaborative tools that have a major impact in enriching the sharing and communication enabling a maximum of collaboration and innovation globally between web users. It is in this con...
Implementation of Winnowing Algorithm with Dictionary English-Indonesia Technique to Detect Plagiarism
The ease of obtaining information that is easy, fast, and cheap from all over the world through the internet network can encourage someone to take action plagiarism. Plagiarism is an intellectual crime that often occurs...
Design of Android-Based Remote Patient Monitoring System
Efficient real-time monitoring systems for Patients with critical health condition have been always helpful for making timely decisions to save the lives. In such systems, the useful monitored factors include SPO2 (Oxyge...
An Internet-based Student Admission Screening System utilizing Data Mining
This study aimed to propose an internet-based student admission screening system utilizing data mining in order for officers to reduce time to evaluate applicants as well as for the faculty to use less human resources on...
A Built-in Criteria Analysis for Best IT Governance Framework
The implementation of IT governance is important to lead and evolve the information system in agreement with stakeholders. This requirement is seriously amplified at the time of the digital area considering all the new t...