Dynamic Password Schemes for Protecting Users from Password Theft for E-Banking
Shimna M. S1, Sangeetha P. S2
1Mrs. Shimna M.S, Department of Computer Science, Vedavyasa Institute of Technology, Malapuram (Kerala), India.
2Mrs. Sangeetha P.S, Assistant Professor, Department of Computer Science, Vedavyasa Institute of Technology, Malapuram (Kerala), India.
Manuscript received on 11 June 2013 | Revised Manuscript received on 17 June 2013 | Manuscript Published on 30 June 2013 | PP: 24-30 | Volume-3 Issue-1, June 2013 | Retrieval Number: A0880063113/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In this paper, we discuss how to prevent users passwords from being stolen by adversaries in online banking and automated teller machines. We propose dynamic password mechanisms in which a user has a mobile, in that mobile the dynamic password scheme is implemented using Android Operating System, so dynamic password requires a small amount of human computing to secure users passwords. Among the schemes, we have a default method (i.e., traditional password scheme), system recommended functions, user-specified functions, user-specified programs. A function/program is used to implement the dynamic password concept. For user-specified functions, we adopt secret little functions and a constant value, in which security is enhanced by hiding both. The computation of human can be reduce by using mobile applications with builtin dynamic password. Here the user only needs to input the system random digits which the system provides and then the dynamic password is automatically calculated for the user. Thus we can overcome the main attacks like phishing, key-logger, shoulder-surfing, mobile malwar attacks simultaneously.
Keywords: Dynamic Password, Net Banking, Secret Little Function, Codebook, Phishing, Key-Loggers, Shoulder-Surfing, Mobile Malwar Attack.
Scope of the Article: Mobile Computing