A New Technique For User Authentication Using Numeric One Time Password Scheme
Salim Istyaq1 , Lovish Agrawal2
Section:Technical Paper, Product Type: Journal Paper
Volume-4 ,
Issue-5 , Page no. 163-165, May-2016
Online published on May 31, 2016
Copyright © Salim Istyaq, Lovish Agrawal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Salim Istyaq, Lovish Agrawal , “A New Technique For User Authentication Using Numeric One Time Password Scheme,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.163-165, 2016.
MLA Style Citation: Salim Istyaq, Lovish Agrawal "A New Technique For User Authentication Using Numeric One Time Password Scheme." International Journal of Computer Sciences and Engineering 4.5 (2016): 163-165.
APA Style Citation: Salim Istyaq, Lovish Agrawal , (2016). A New Technique For User Authentication Using Numeric One Time Password Scheme. International Journal of Computer Sciences and Engineering, 4(5), 163-165.
BibTex Style Citation:
@article{Istyaq_2016,
author = {Salim Istyaq, Lovish Agrawal },
title = {A New Technique For User Authentication Using Numeric One Time Password Scheme},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {4},
Issue = {5},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {163-165},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=925},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=925
TI - A New Technique For User Authentication Using Numeric One Time Password Scheme
T2 - International Journal of Computer Sciences and Engineering
AU - Salim Istyaq, Lovish Agrawal
PY - 2016
DA - 2016/05/31
PB - IJCSE, Indore, INDIA
SP - 163-165
IS - 5
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1699 | 1389 downloads | 1433 downloads |
Abstract
The text-based password has been the default security medium for years. However, the difficulty of memorizing secure strong passwords often leads to insecure practices. In this fast computer era, the Internet users are increasing on each second. Now mostly people are using different online service provided by Banks, Schools, Hospitals, online utility bill payment and online shopping sites. The text-based authentication scheme faces some drawbacks with usability and security issues that bring troubles to users. For example, if the user is not intelligently constructed the password with extra security measures, it is very easy for hacker to hack. On the contrary, if a password is hard to guess, then it is often hard to remember. A person has to memorize as many passwords as many different websites he/she is using. So he/she gets confused and/or forgets the correct user Id/password combinations. We should have an alternative system to overcome these problems. In this paper, a comprehensive study of existing graphical password scheme and shoulder surfing problem is performed. The best way in One Time Password authentication is proposed for enhancement in security and privacy.
Key-Words / Index Term
One Time Password (OTP), Authentication, Usability, Security, Shoulder Surfing
References
[1] http://rroij.com/open-access/an-approach-for-user-authentication-one-time-password-numeric-and-graphical-scheme-54-57.php?aid=37786
[2] A. Adams and M. A. Sasse, “Users are not the enemy: why users compromise computer security mechanisms and how to take remedial measures”, Communications of the ACM, Volume-42, Page No (41-46), 1999.
[3] Pavan Gujjar Panduranga Rao, Dr.G. Lavanya Devi and Dr.P.Srinivasa Rao, “A Study of Various Graphical Passwords Authentication Schemes Using Ai Hans Peter Wickelgren Approach” , Volume-10, Issue-6, Page No (6), May-Jun 2013.
[4] Brajesh Kumar Kushwaha, “AN APPROACH FOR USER AUTHENTICATION ONE TIME PASSWORD (NUMERIC AND GRAPHICAL) SCHEME”, Journal of Global Research in Computer Science, Volume-3, Page No (1), Nov 11, 2012.
[5] Mohite Sandhya, Kare Rohini, Bhongale Pooja, Bhosale Priyanka, “Graphical Password Authentication using Modified Persuasive Cued Click-Point”, International Journal of Computer Science Engineering (IJCSE), Volume-2, Page No (2), Mar 2, 2015.
[6] Jesudoss A., Subramaniam N.P., “A SURVEY ON AUTHENTICATION ATTACKS AND COUNTERMEASURES IN A DISTRIBUTED ENVIRONMENT”, Indian Journal of Computer Science and Engineering (IJCSE), Volume-5, No.-2, April-May 2014.
[7] http://www.bioinfo.in/uploadfiles/13476885341_1_2_WRJHCI.pdf
[8] Saranya Ramanan and Bindhu J S, “A Survey on Different Graphical Password Authentication Techniques”, Volume-2, Page No (7), Dec 12, 2014.