Multifactor Authentication On Mobile Phones Using Existing BrightPass
Main Article Content
Abstract
The use of smart phones have increased rapidly in the last few years.Due to the emerging technology, Internet is a wide choice for various transactions such as e-business, e-commerce, e-banking .For this smart phones become very useful devices, so these phones are interesting targets for hackers. To maintain the extraordinary level of trust industry should adopt strong authentication mechanism . Earlier single factor and two factor mechanism are vulnerable to malware attack. More advanced malware can easily bypass OTP based two factor authentication by intercepting the OTP. The OTP which comes from SMS can easily be stolen. Further, SMS costs and delays in SMS are drawbacks in this system. .There is need to develop a system which generates secure OTP on the mobile device itself which is secure from attackers. With the help of out of band authentication which uses two different communication channels for authentication system lessen the probability of attack on the system. So, to enhance the security in transactions we are going propose a system which generates OTP on the mobile itself with the help of lie sequence in the BrightPass .We are using nested hashing function to generate an OTP which adds complexity for an attacker. With the help two channels such as internet and mobile phones the chances of attack on our system is very low. Our proposed system presents a multi-factor authentication in which a users device produces a PIN from seed from various parameters. This proposed system reduces the limitations of the SMS system.
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.