11.07.2015 Views

ISSN: 2250-3005 - ijcer

ISSN: 2250-3005 - ijcer

ISSN: 2250-3005 - ijcer

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

International Journal Of Computational Engineering Research (<strong>ijcer</strong>online.com) Vol. 2 Issue. 8IX. ConclusionA user authentication protocol named oPass which leverages cell phone and SMS to thwart passwordstealing and password reuse attacks. oPass assume that each website possesses a unique phone number. It alsoassume that a telecommunication service provider participants in the registration and recovery phases. The designprinciple of oPass is to eliminate the negative influence of human factors as much as possible. Through oPass, eachuser only needs to remember a long-term password which has been used to protect their cell phone. Users are freefrom typing any passwords into untrusted computers for login on all websites. OPass is efficient for websiteauthentication to prevent phising, keylogger and malware. SMS delay could increase the execution time and reducethe performance. The performance of oPass can be improved by Round Robin DNS with the help of simultaneousresponse from the server for multiple users at a time. Internet relay chat protocol can be used for synchronousconferencing of SMS service. There by communication overhead can be reduced because of many transactions.References[1] Hung-Min Sun, Yao-Hsin Chen, and Yue-Hsun Lin,‖oPass: A user authentication protocol resistant topassword stealing and password reuse attacks,‖ ieee transactions on information forensics and security, vol.7, no. 2, april 2012[2] S.Gaw and E.W.Felten,―Password management strategies for onlineaccounts,‖ inSOUPS ’06: Proc. 2ndSymp. Usable Privacy. Security, New York, 2006, pp. 44–55, ACM.[3] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, ―The design and analysis of graphicalpasswords,‖ inSSYM’99: Proc. 8thConf. USENIX Security Symp, Berkeley, CA, 1999, pp. 1–1, USENIXAssociation.[4] J. Thorpe and P. van Oorschot, ―Towards secure design choices for im-plementing graphical passwords,‖presented at the 20th. Annu. Com-puter Security Applicat. Conf, 2004.[5] S.Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon,―Passpoints: Design and longitudinalevaluation of a graphical pass-word system,‖Int. J. Human-Computer Studies, vol. 63, no. 1–2, pp.102–127,2005.[6] B. Pinkas and T. Sander, ―Securing passwords against dictionary at-tacks,‖ inCCS ’02: Proc. 9th ACMConf. Computer Communications Security, New York, 2002, pp. 161–170, ACM.[7] J. A. Halderman, B. Waters, and E. W. Felten, ―A convenient method for securely managing passwords,‖inWWW ’05: Proc. 14th Int. Conf. World Wide Web, New York, 2005, pp. 471–479, ACM.[8] K.-P. Yee and K. Sitaker, ―Passpet: Convenient password management and phishing protection,‖ inSOUPS’06: Proc. 2nd Symp. Usable Pri-vacy Security,New York,2006,pp.32–43,ACM.[9] L. Lamport,, ―Password authentication with insecure communication,‖ Commun. ACM, vol. 24, pp. 770–772, Nov. 1981.[10] H. Krawczyk, ―The order of encryption and authentication for pro-tecting communications (or: How secureis SSL?),‖ inAdvances Cryp-tology—CRYPTO 2001, 2001, pp. 310–331.[11] M. Mannan and P. van Oorschot,, ―Using a personal device to strengthen password authentication from anuntrusted computer,‖ Financial Cryptography Data Security, pp. 88–103, 2007.[12] C. Yue and H. Wang, ―SessionMagnifier: A simple approach to secure and convenient kiosk browsing,‖inProc. 11th Int. Conf. UbiquitousComputing, 2009, pp. 125–134, ACM.[13] D. Wendlandt, D. G. Andersen, and A. Perrig, ―Perspectives: Im-proving ssh-style host authentication withmulti-path probing,‖ in Proc. USENIX 2008 Annu. Tech. Conf., Berkeley, CA, 2008, pp. 321–334, USENIXAssociation.[14] R. Biddle, S. Chiasson, and P. van Oorschot, ―Graphical passwords: Learning from thefirst twelve years,‖ inACM Computing Surveys, Carleton Univ., 2010.Issn <strong>2250</strong>-<strong>3005</strong>(online) December| 2012 Page 115

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!