11.07.2015 Views

ISSN: 2250-3005 - ijcer

ISSN: 2250-3005 - ijcer

ISSN: 2250-3005 - ijcer

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

International Journal Of Computational Engineering Research (<strong>ijcer</strong>online.com) Vol. 2 Issue. 8Server can decrypt and verify the authenticity of the registration SMS and then obtain with the shared key Serveralso compares the source of received SMS with to prevent SMS spoofing attacks. At the end of registration, thecellphone stores all information ID, except for the long term password and the secret. Variable indicates the currentindex of the one-time password and is initially set to 0. With, the server can authenticate the user device during eachlogin.B. Login PhaseThe login phase begins when the user sends a request to the server through an untrusted browser (on aiosk).The user uses her cellphone to produce a one-time password and deliver necessary information encrypted withto server via an SMS message. Based on preshared secret credential, server can verify and authenticate user basedon Fig. 4 shows the detail flows of the login phase. The protocol starts when user wishes to log into her favorite webserver (already registered). However, begins the login procedure by accessing the desired website via a browser onan untrusted kiosk. The browser sends a request to with user’s account ID. Next, server supplies the ID and a freshnonce to the browser. Meanwhile, this message is forwarded to the cellphone through Bluetooth or wirelessinterfaces. After reception of the message, the cellphone inquires related information from its database via ID, whichincludes server’s phone number and other parameters. The next step is promoting a dialog for her long-termpassword. Secret shared credential can regenerate by inputting the correct on the cellphone. The one-time passwordfor current login is recomputed using the following operations:Fig. 3. Registration phaseFig. 4. Login phaseAfter receiving the login SMS, the server recomputed (i.e., ) to decrypt and verify the authenticity of thelogin SMS. If the received equals the previously generated, the user is legitimate; otherwise, the server will rejectthis login request. Upon successful verification, the server sends back a success message through the Internet, to theuser device. The cellphone will verify the received message to ensure the completion of the login procedure.D. Recovery PhaseRecovery phase is designated for some specific conditions; for example, a user may lose her cellphone. Theprotocol is able to recover oPass setting on her new cellphone assuming she still uses the same phone number (applya new SIM card with old phone number). Once user installs the oPass program on her new cellphone, she can launchthe program to send a recovery request with her account ID and requested server ID to predefined TSP through a 3Gconnection. As we mentioned before, ID can be the domain name or URL link of server. Similar to registration, TSPcan trace her phone number based on her SIM card and forward her account ID and the server ID to server throughan SSL tunnel. Once server receives the request probes the account information in its database to confirm if accountis registered or not. If account ID exists, the information used to compute the secret credential will be fetched and besent back to the user. The server generates a fresh nonce and replies a message which consists of ID s. This messageincludes all necessary elements for generating the next one-time passwords to the user. When the mobile programreceives the message, like registration, it forces the user to enter her long-term password to reproduce the correctone-time password (assuming the last successful login before lost her cellphone is ). During the last step, the user’scellphone encrypts the secret credential and server nonce to a cipher text. The recovery SMS message is deliveredIssn <strong>2250</strong>-<strong>3005</strong>(online) December| 2012 Page 110

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!