Corpus ID: 16879688

QR Code based secure OTP distribution scheme for Authentication in Net-Banking

@inproceedings{Tandon2013QRCB,
  title={QR Code based secure OTP distribution scheme for Authentication in Net-Banking},
  author={Abhas Tandon and Rahul Sharma and Sankalp Sodhiya and P. R. Vincent},
  year={2013}
}
Authentication is the process of verifying the identity of a user. One time passwords (OTP) play a vital role for authentication in net-banking to make it more secure. OTP are used to provide higher layer of security over static passwords that are prone to replay attacks. Distribution of OTPs to concerned user is a major issue. Short message service that is available for mobile phones is the most common methodology for OTP distribution. Quick Response code (QR code) is actually two dimensional… Expand

Figures from this paper

A User Authentication Scheme Using Real-Time Location, QR-Code, and One Time Password: A Preliminary Work
TLDR
A user authentication scheme based on real-time location using a combination of One Time Password (OTP) and Quick Response (QR)-Code and the weakness of OTP is covered with the use of QR-Code. Expand
PENERAPAN METODE SMART AUTHENTICATION DALAM LAYANAN E-BANKING MENGGUNAKAN TWO CHANNEL AUTHENTICATION DAN QR-CODE PADA PERANGKAT MOBILE ANDROID
E-banking is one of the banking service that applies technology and information which is progressing rapidly, because E-banking services on mobility and flexibility so that customers are able toExpand
Achieving Privacy and Security Using QR Code by Means of Encryption Technique in ATM
TLDR
This work intends to develop an authentication system to banks that protects the asset of user's and proposes a system, where ATM machine will have a QR code in which the information's are encrypted corresponding to the ATM machine and a mobile application in the customer's mobile which will decrypt the encoded QR information. Expand
S-Mbank: Secure mobile banking authentication scheme using signcryption, pair based text authentication, and contactless smart card
TLDR
A new scheme called S-Mbank is proposed, which replaces the authentication using the one-time password with the contactless smart card to prevent attackers to use the unencrypted message which is sent to the user's mobile phone. Expand
Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication
TLDR
The performance comparison between RSA and Elliptic Curve Cryptography-based QR Code Authentication is proposed and mainly focuses on QR Code, as it is now widely used all over the world. Expand
Offline OTP Based Solution for Secure Internet Banking Access
TLDR
The most reliable and adoptable solution which provides better security in online banking transactions is proposed and is an initiative to eradicate the dependency on Global System for Mobile communication (GSM) that is the most popular means of sending the One- Time-Passwords to the users availing e-banking facilities. Expand
A Design of Elliptic Curve Cryptography-Based Authentication Using QR Code
TLDR
A design of elliptic curve cryptography-based authentication using QR Code is proposed, which mainly focuses on QR Code, as it is now widely used all over the world. Expand
A survey on E-mail Security and Authentication Process
TLDR
This paper focuses on novel information concealing methods gave by the field of steganography to confirm an encoded computerized signature, covered up in an advanced picture, using a calculation which utilizes these two procedures together and examines the execution of the framework. Expand
A uniform approach for multilevel email security using image authentication, compression, OTP & cryptography
TLDR
This work proposes a safe confirmation administration construction modelling ISA-CC (Image Sequence Authentication-Compression & Cryptography) that is picture based and wipes out the requirement for content passwords. Expand
Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures
TLDR
This review study reveals that the current 2FA scheme for mobile money has security gaps that need to be addressed since it only uses a personal identification number (PIN) and a subscriber identity module (SIM) to authenticate users, which are susceptible to attacks. Expand
...
1
2
...

References

SHOWING 1-10 OF 12 REFERENCES
A One-Time Password Scheme with QR-Code Based on Mobile Phone
TLDR
The proposed scheme based on QR code not only eliminates the usage of the password verification table, but also is a cost effective solution since most internet users already have mobile phones. Expand
A Novel User Authentication Scheme Based on QR-Code
TLDR
The attraction of the QR - code technique can be introduced into the one-time password authentication protocol and not only eliminates the usage of the password verification table, but also is a cost effective solution since most internet users already have mobile phones. Expand
OTP Authentication Protocol Using Stream Cipher with Clock-Counter
TLDR
An advanced protocol which is using clock-count method to apply a stream cipher algorithm to OTP protocols and to solve problems of existing OTP Protocols is proposed. Expand
Secure eTickets based on QR-Codes with user-encrypted content
TLDR
A new model for secure eTickets based on QR-Codes with user-encrypted content that maximizes the QR-code payload for the screen areas in off-the-shelf scanning devices is proposed. Expand
Reversible data hiding with histogram-based difference expansion for QR code applications
TLDR
A new algorithm in reversible data hiding, with the application associated with the quick response (QR) codes, so that the QR codes can be hidden into the original image, and considerable increase in embedding capacity can be expected. Expand
Password authentication with insecure communication
A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and theExpand
Application research of the AES encryption algorithm on the engine anti-theft system
TLDR
This paper proposes the AES encryption methods and steps which are appropriate for the identity authentication of engine anti-theft system, and designs the experimental program and obtains good results. Expand
Contextual QR Codes
  • J. Rouillard
  • Computer Science
  • 2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008)
  • 2008
TLDR
This paper proposes the notion of contextual QR codes that merge a public QR code and private information, in order to provide data related to a particular context. Expand
Security and usability: the gap in real-world online banking
TLDR
It is found that many security requirements of online banking are too difficult for regular users to follow, and believe that some marketing-related messages about safety and security actually mislead users. Expand
International Journal of Engineering and Technology (IJET)
  • International Journal of Engineering and Technology (IJET)
  • 2013
...
1
2
...