A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 142 , Downloads: 115 | CTR: 81 % | Weekly Popularity: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V, G. Lavanya

Now-a-days, most of the users are using the websites, at the time of login session user have to enter the user name and password.Here, text password is the most familiar form of user authentication on websites, due to its well-located and simplicity.however, users password are prone to be stolen and compromised under different coercion and vulnerabilities. Sometimes, user may select the weak password for their remembrance and reuse the same password across the many variant websites. This may leads to the domino effects. Sometimes user may use the passwords in unauthorized computer suffers password thief coercions. the password is prone to stealing attacks such as phishing, malware and key loggers etc. In this paper, a user authentication protocol named Opass is designed, that makes use of the customers cellular phone and short message service to ensure protection against password stealing attacks. Opass requires a unique phone number that will be possessed by each participating website. The registration and the recovery phases involve a telecommunication service provider. The main concept of the project is reducing the password reuse attack. We have implemented the one time password technology, and then reduce the password validity time. The performance had improved the security.

Keywords: user authentication, hash function, network security, one-time password, password reuse attack, password stealing attack, encryption

Edition: Volume 3 Issue 9, September 2014

Pages: 1006 - 1011

Share this Article

How to Cite this Article?

Joga Venkata Hari Babu V, G. Lavanya, "A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14282, Volume 3 Issue 9, September 2014, 1006 - 1011

142 PDF Views | 115 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'user authentication'

Views: 157 , Downloads: 104 | CTR: 66 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Views: 132 , Downloads: 106 | CTR: 80 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

Views: 134 , Downloads: 107 | CTR: 80 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 852 - 855

An Efficient User Authentication using Captcha and Graphical Passwords-A Survey

S. Karthika, Dr. P. Devaki

Share this Article

Views: 140 , Downloads: 107 | CTR: 76 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Share this Article

Views: 127 , Downloads: 107 | CTR: 84 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1048 - 1052

Authentication by Equalizing the Graphical Bars

Salim Istyaq

Share this Article

Similar Articles with Keyword 'hash function'

Views: 141 , Downloads: 99 | CTR: 70 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Views: 146 , Downloads: 100 | CTR: 68 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Views: 132 , Downloads: 104 | CTR: 79 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 5, May 2017

Pages: 2718 - 2725

Fast Dictionary Construction using Data Structure and Numeration Methodology with Double Hashing

Safa S. Abdul-Jabbar, Loay E. George

Share this Article

Views: 131 , Downloads: 108 | CTR: 82 %

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1539 - 1542

Privacy Based Association Rules in Secure Horizontal Database

Zameena R, Nitha L Rozario

Share this Article

Views: 137 , Downloads: 110 | CTR: 80 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1681 - 1685

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Pranita Bakka, Dr. Jayashree Agarkhed

Share this Article

Similar Articles with Keyword 'network security'

Views: 133 , Downloads: 100 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Views: 133 , Downloads: 100 | CTR: 75 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article

Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Views: 126 , Downloads: 103 | CTR: 82 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article

Views: 146 , Downloads: 103 | CTR: 71 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Similar Articles with Keyword 'one-time password'

Views: 142 , Downloads: 115 | CTR: 81 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1006 - 1011

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V, G. Lavanya

Share this Article

Views: 155 , Downloads: 117 | CTR: 75 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1861 - 1866

E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack

Gore Kranti K, Jarali Vilas M

Share this Article

Views: 175 , Downloads: 138 | CTR: 79 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 878 - 881

A Novel Approach to Anti-Phishing Using Visual Cryptography

Sofia Backiya B., Geetha M., Sathya M., Preethika D.

Share this Article

Views: 153 , Downloads: 140 | CTR: 92 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 280 - 285

Web Application based Authentication Schemes to Resist Password Reuse and Password Stealing Attacks

Tanzila Maqsood Mirza, Shrikant R. Tandle

Share this Article

Views: 198 , Downloads: 151 | CTR: 76 %

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 142 - 145

A Survey on One Time Password

Mirza Tanzila Maqsood, Pooja Shinde

Share this Article

Similar Articles with Keyword 'password reuse attack'

Views: 142 , Downloads: 115 | CTR: 81 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1006 - 1011

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V, G. Lavanya

Share this Article

Views: 155 , Downloads: 117 | CTR: 75 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1861 - 1866

E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack

Gore Kranti K, Jarali Vilas M

Share this Article

Views: 146 , Downloads: 120 | CTR: 82 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 379 - 381

A Novel Security Model For Password Stealing And Password Reuse Attacks

P.Kasthuri, R.Kokila

Share this Article

Views: 153 , Downloads: 140 | CTR: 92 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 280 - 285

Web Application based Authentication Schemes to Resist Password Reuse and Password Stealing Attacks

Tanzila Maqsood Mirza, Shrikant R. Tandle

Share this Article

Views: 198 , Downloads: 151 | CTR: 76 %

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 142 - 145

A Survey on One Time Password

Mirza Tanzila Maqsood, Pooja Shinde

Share this Article

Similar Articles with Keyword 'password stealing attack'

Views: 142 , Downloads: 115 | CTR: 81 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1006 - 1011

A Secure Authentication Protocol to vigilant from Password Stealing and Reuse Attacks by using Opass

Joga Venkata Hari Babu V, G. Lavanya

Share this Article

Views: 155 , Downloads: 117 | CTR: 75 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1861 - 1866

E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack

Gore Kranti K, Jarali Vilas M

Share this Article

Views: 146 , Downloads: 120 | CTR: 82 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 379 - 381

A Novel Security Model For Password Stealing And Password Reuse Attacks

P.Kasthuri, R.Kokila

Share this Article

Views: 153 , Downloads: 140 | CTR: 92 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 280 - 285

Web Application based Authentication Schemes to Resist Password Reuse and Password Stealing Attacks

Tanzila Maqsood Mirza, Shrikant R. Tandle

Share this Article

Views: 198 , Downloads: 151 | CTR: 76 %

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 142 - 145

A Survey on One Time Password

Mirza Tanzila Maqsood, Pooja Shinde

Share this Article

Similar Articles with Keyword 'encryption'

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article
Top