International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013

Web Based Security using Online Password Authentication in Mobile Application

A. T. Bhole, Sheetal Chaudhari

The internet has one of the most convenient and widely used media for people for exchanging information and to do business over the internet. E.g. Accessing web based emails, online auction or banking sites. But now a days accessing the internet is faced with many challenges. One of the most popular challenges is to ensure security with vital role to provide security in websites. Text password is a convenient and simplest form for a user authentication on websites, and it is level to security attacks. User mostly used weak password and it is often used across several websites and reuse password by typing into untrusted websites causes password threats. Hackers launch password stealing methods to grab password such as phishing, malware, and key loggers. The proposed system is a user authentication protocol named LOPass which creates long term password and one time password for authenticating the user. It uses three phases as registration, login and recovery phase. Here random password is generated for each login. Registration is used to register the user. Recovery phase is used, if the users mobile phone gets lost. The user needs remember only his long term password which has been stored in database very secretly and securely.

Keywords: Network security, User authentication, Long Term Password, One Time Password, LOPass

Edition: Volume 2 Issue 7, July 2013

Pages: 74 - 77


How to Cite this Article?

A. T. Bhole, Sheetal Chaudhari, "Web Based Security using Online Password Authentication in Mobile Application", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=0201393, Volume 2 Issue 7, July 2013, 74 - 77

24 PDF Views | 22 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Network security'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2762 - 2766

Large Scale Data Shared by Peer to Peer Based System in Shared Network

Bhavsar Harshada V., Dr. S. V. Gumaste, Prof. Deokate Gajanan S.

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1289 - 1292

CARV System ? Cryptographic Algorithms Representing Visually System

Pyarimol Nair, Neethu Krishnan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 964 - 968

Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique

Sajjade Zeba-Shazesh, Aruna K. Gupta

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this article

Similar Articles with Keyword 'User authentication'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2703 - 2708

Security to Outsource Data in Community Cloud with the Trusted Tenant System

Kundan Kunal, Dr. Latesh Malik

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 570 - 575

CaRP For User Authentication System Using Mobile Interface

Walanjkar Dipika Dattatraya, V. S. Nandedkar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1861 - 1866

E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack

Gore Kranti K, Jarali Vilas M

Share this article

Similar Articles with Keyword 'Long Term Password'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 74 - 77

Web Based Security using Online Password Authentication in Mobile Application

A. T. Bhole, Sheetal Chaudhari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 729 - 732

Secure One Time Password Generation for Website Security using Mobile Phone with Biometrics

C. Josy Nambickai Rani, Linda Joseph, E.R.Naganathan

Share this article

Similar Articles with Keyword 'One Time Password'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1861 - 1866

E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack

Gore Kranti K, Jarali Vilas M

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 574 - 579

Internet Banking Fraud Detection using HMM and BLAST-SSAHA Hybridization

Avanti H. Vaidya, S. W. Mohod

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2465 - 2468

E-Voting Using Face Detection and Recognition (FDR), One Time Password (OTP)

Vahbiz Pardiwalla, Danista. S. Shaikh, Pooja Bhosale, Prof. J. R. Pansare

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1006 - 1011

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V, G. Lavanya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1167 - 1172

Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space

Taranpreet Kaur, Harmandeep Singh

Share this article

Top