Abstract

Online transaction’s security is challenging. Entities involved in such transactions need to be intelligent enough and sustainable to its misuse. Online applications are more vulnerable to attacks. There are methods to overcome these vulnerabilities by implementing security measures. One of the recent popular measures includes two-factor authentication system, where the user will be having password (known to him) and one time password (OTP) will be sent as short messaging service (SMS) to the authorized user mobile. However, due to misplacement of mobile or less physical secured mobile devices or due to man-in-middle attacks or OTP sniffing, the OTP can be compromised. The work in this paper proposes a methodology to distribute the keys securely over the network. Further, an algorithm is proposed, which proposes an authentication mechanism which is sustainable to the misuse of OTP enabled authentication mechanism. This novel authentication technique uses an additional security hardware TPM at both the communicating ends to achieve the security requirements such as confidentiality, integrity, and authenticity. The proposed method provides a mechanism that may be used whenever there is a need to eliminate the involvement of trusted third party in any real-time transactions.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call