Views: 142 , Downloads: 115 | CTR: 81 % | Weekly Popularity: ⮙1
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014
A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass
Joga Venkata Hari Babu V, G. Lavanya
Now-a-days, most of the users are using the websites, at the time of login session user have to enter the user name and password.Here, text password is the most familiar form of user authentication on websites, due to its well-located and simplicity.however, users password are prone to be stolen and compromised under different coercion and vulnerabilities. Sometimes, user may select the weak password for their remembrance and reuse the same password across the many variant websites. This may leads to the domino effects. Sometimes user may use the passwords in unauthorized computer suffers password thief coercions. the password is prone to stealing attacks such as phishing, malware and key loggers etc. In this paper, a user authentication protocol named Opass is designed, that makes use of the customers cellular phone and short message service to ensure protection against password stealing attacks. Opass requires a unique phone number that will be possessed by each participating website. The registration and the recovery phases involve a telecommunication service provider. The main concept of the project is reducing the password reuse attack. We have implemented the one time password technology, and then reduce the password validity time. The performance had improved the security.
Keywords: user authentication, hash function, network security, one-time password, password reuse attack, password stealing attack, encryption
Edition: Volume 3 Issue 9, September 2014
Pages: 1006 - 1011
How to Cite this Article?
Joga Venkata Hari Babu V, G. Lavanya, "A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14282, Volume 3 Issue 9, September 2014, 1006 - 1011
142 PDF Views | 115 PDF Downloads
Similar Articles with Keyword 'user authentication'
Views: 157 , Downloads: 104 | CTR: 66 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 598 - 602Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment
Deepak G, Dr. Pradeep. B. S, Shreyas Srinath
Views: 132 , Downloads: 106 | CTR: 80 % | Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2452 - 2457A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology
R. Buvanesvari, V. Prasath
Views: 134 , Downloads: 107 | CTR: 80 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 852 - 855An Efficient User Authentication using Captcha and Graphical Passwords-A Survey
S. Karthika, Dr. P. Devaki
Views: 140 , Downloads: 107 | CTR: 76 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 1604 - 1610A Novel Model for S.M.S Security and SPAM Detection
Nikhila Zalpuri
Views: 127 , Downloads: 107 | CTR: 84 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1048 - 1052Authentication by Equalizing the Graphical Bars
Salim Istyaq
Similar Articles with Keyword 'hash function'
Views: 141 , Downloads: 99 | CTR: 70 % | Weekly Popularity: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Views: 146 , Downloads: 100 | CTR: 68 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1548 - 1550Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
Chaitali P. Kathar, Vidya Dhamdhere
Views: 132 , Downloads: 104 | CTR: 79 % | Weekly Popularity: ⮙4
Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 5, May 2017
Pages: 2718 - 2725Fast Dictionary Construction using Data Structure and Numeration Methodology with Double Hashing
Safa S. Abdul-Jabbar, Loay E. George
Views: 131 , Downloads: 108 | CTR: 82 %
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1539 - 1542Privacy Based Association Rules in Secure Horizontal Database
Zameena R, Nitha L Rozario
Views: 137 , Downloads: 110 | CTR: 80 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1681 - 1685Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Pranita Bakka, Dr. Jayashree Agarkhed
Similar Articles with Keyword 'network security'
Views: 133 , Downloads: 100 | CTR: 75 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1728 - 1731Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V
Views: 133 , Downloads: 100 | CTR: 75 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016
Pages: 1112 - 1116Network Security Mechanism Based On Static Internet Protocol Addressing
Ahmed D. Asad
Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2535 - 2538A Survey on Security Mechanism using Colors and Armstrong Numbers
Nutan Gurav, Pratap Singh
Views: 126 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1373 - 1376Filtering of Malicious Traffic Based on Optimal Source
Pikkili Mahendra, K. Raghavendra Rao
Views: 146 , Downloads: 103 | CTR: 71 % | Weekly Popularity: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Similar Articles with Keyword 'one-time password'
Views: 142 , Downloads: 115 | CTR: 81 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1006 - 1011A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass
Joga Venkata Hari Babu V, G. Lavanya
Views: 155 , Downloads: 117 | CTR: 75 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1861 - 1866E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack
Gore Kranti K, Jarali Vilas M
Views: 175 , Downloads: 138 | CTR: 79 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017
Pages: 878 - 881A Novel Approach to Anti-Phishing Using Visual Cryptography
Sofia Backiya B., Geetha M., Sathya M., Preethika D.
Views: 153 , Downloads: 140 | CTR: 92 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 280 - 285Web Application based Authentication Schemes to Resist Password Reuse and Password Stealing Attacks
Tanzila Maqsood Mirza, Shrikant R. Tandle
Views: 198 , Downloads: 151 | CTR: 76 %
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 142 - 145A Survey on One Time Password
Mirza Tanzila Maqsood, Pooja Shinde
Similar Articles with Keyword 'password reuse attack'
Views: 142 , Downloads: 115 | CTR: 81 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1006 - 1011A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass
Joga Venkata Hari Babu V, G. Lavanya
Views: 155 , Downloads: 117 | CTR: 75 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1861 - 1866E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack
Gore Kranti K, Jarali Vilas M
Views: 146 , Downloads: 120 | CTR: 82 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 379 - 381A Novel Security Model For Password Stealing And Password Reuse Attacks
P.Kasthuri, R.Kokila
Views: 153 , Downloads: 140 | CTR: 92 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 280 - 285Web Application based Authentication Schemes to Resist Password Reuse and Password Stealing Attacks
Tanzila Maqsood Mirza, Shrikant R. Tandle
Views: 198 , Downloads: 151 | CTR: 76 %
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 142 - 145A Survey on One Time Password
Mirza Tanzila Maqsood, Pooja Shinde
Similar Articles with Keyword 'password stealing attack'
Views: 142 , Downloads: 115 | CTR: 81 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1006 - 1011A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass
Joga Venkata Hari Babu V, G. Lavanya
Views: 155 , Downloads: 117 | CTR: 75 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 1861 - 1866E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack
Gore Kranti K, Jarali Vilas M
Views: 146 , Downloads: 120 | CTR: 82 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013
Pages: 379 - 381A Novel Security Model For Password Stealing And Password Reuse Attacks
P.Kasthuri, R.Kokila
Views: 153 , Downloads: 140 | CTR: 92 % | Weekly Popularity: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017
Pages: 280 - 285Web Application based Authentication Schemes to Resist Password Reuse and Password Stealing Attacks
Tanzila Maqsood Mirza, Shrikant R. Tandle
Views: 198 , Downloads: 151 | CTR: 76 %
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 142 - 145A Survey on One Time Password
Mirza Tanzila Maqsood, Pooja Shinde
Similar Articles with Keyword 'encryption'
Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2338 - 2340Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device
Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar
Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2457 - 2460Privacy Preserved Encrypted Cloud Data Access
Anes P. A., Neethu Francis