UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 6
June-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1906X76


Registration ID:
219124

Page Number

300-313

Share This Article


Jetir RMS

Title

A Secure Authentication Schema Using Personal Devices

Abstract

Authentication plays a vital role in providing security to the online banking system. At present, many banks are using a combination of username and password to authenticate and verify users. Thus, memorizing such usernames and password becomes a difficult task.Now a day’s many people are doing on-line financial transactions. This transaction or records needs to be safe and secure. Now a days there are numbers of attacks present. Phishing is one type of attack. For detecting this attack, numerous anti-phishing mechanisms are used. In addition to this, legacy authentication methods have failed many times and they are less efficient against wide range of users, networks and authentication server attacks. As per the data breach records, the attackers have used the high-tech techniques to steal users credentials which is a serious threat. In this paper, we propose an effective and practical user authentication scheme using a personal device that uses various cryptographic primitives such as encryption, digital signature, and hashing. These techniques make use of different ubiquitous computing and intelligent portable and wearable devices. This technique will enable user to use a secure authentication protocol .Our proposed technique does not require an authentication server to maintain static username and password tables for identifying legitimate users. Also, this technique can secure the user against password attacks as well as it can fight against replay attacks, shoulder surfing attacks, phishing attacks, and data breaches.

Key Words

Keywords - Authentication, One Time Username ,Access Control.

Cite This Article

"A Secure Authentication Schema Using Personal Devices", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 6, page no.300-313, June 2019, Available :http://www.jetir.org/papers/JETIR1906X76.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A Secure Authentication Schema Using Personal Devices", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 6, page no. pp300-313, June 2019, Available at : http://www.jetir.org/papers/JETIR1906X76.pdf

Publication Details

Published Paper ID: JETIR1906X76
Registration ID: 219124
Published In: Volume 6 | Issue 6 | Year June-2019
DOI (Digital Object Identifier):
Page No: 300-313
Country: Beed, Maharashtra, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002809

Print This Page

Current Call For Paper

Jetir RMS