Secure Internet Banking with Visual Authentication Protocol

Authors

  • Saraswathi. R  Dhanalakshmi College of Engineering, Kancheepuram District, Tamilnadu, India
  • Shanmathi. G  Dhanalakshmi College of Engineering, Kancheepuram District, Tamilnadu, India
  • Preethi. P  Dhanalakshmi College of Engineering, Kancheepuram District, Tamilnadu, India
  • Arul. U  Dhanalakshmi College of Engineering, Kancheepuram District, Tamilnadu, India

Keywords:

Authentication, QR code,Android mobile, keylogger

Abstract

Keylogging or keyboard capturing, is the action of recording (or logging) the keys struck on a keyboard typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. It also has very legitimate uses in studies of human-computer interaction. There are numerous keylogging methods ranging from hardware and software-based approaches Involving human in authentication protocols, while promising, is not easy because of their limited capability of computation and memorization. We demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. We propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password-based authentication protocol. Our approach for real-world deployment: we were able to achieve a high level of usability while satisfying stringent security requirements.

References

  1. A. Hiltgen, T. Kramp, and T. Weigold. Secure internet bankingauthentication. IEEE Security and Privacy, 4:21–29, March 2006.

  2. A. Slowinska and H. Bos. Pointless tainting?: evaluating the practicalityof pointer tainting. In Proc. of ACM EuroSys, pages 61–74, 2009. 

  3. B. Parno, C. Kuo, and A. Perrig. Phoolproof phishing prevention. InProc. of Financial Cryptography, pages 1–19, 2006.

  4.  E. Hayashi, R. Dhamija, N. Christin, and A. Perrig. Use your illusion: secure authentication usable anywhere. In Proc. of ACM SOUPS, 2008.

  5. E. Rescorla. SSL and TLS: designing and building secure systems. Addison-Wesley, 2001.

  6. H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection

  7. J. M. McCune, A. Perrig, and M. K. Reiter. Seeing-is-believing: Using camera phones for human-verifiable authentication. In Proc. of IEEE Symposium on Security and Privacy, pages 110–124, 2005.

  8. N. Hopper and M. Blum. Secure human identification protocols. In Proc. of ASIACRYPT, 2001. Communications of the ACM, 24(11):770–772, 1981.

Downloads

Published

2015-02-25

Issue

Section

Research Articles

How to Cite

[1]
Saraswathi. R, Shanmathi. G, Preethi. P, Arul. U, " Secure Internet Banking with Visual Authentication Protocol, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.351-353, January-February-2015.