2009 IEEE/ACS International Conference on Computer Systems and Applications 2009
DOI: 10.1109/aiccsa.2009.5069395
|View full text |Cite
|
Sign up to set email alerts
|

Two factor authentication using mobile phones

Abstract: Abstract-This paper describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for One Time Password generation. The generated One Time Password is valid for only a short userdefined period of time and is generated by factors that are unique to both, the user and the mobile device its… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
117
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 209 publications
(117 citation statements)
references
References 4 publications
0
117
0
Order By: Relevance
“…This application emphasizes how a Mobile Token can be run without the initial authentication process first, so the process can be shortened to avoid the difficult process of authentication [12].…”
Section: Resultsmentioning
confidence: 99%
“…This application emphasizes how a Mobile Token can be run without the initial authentication process first, so the process can be shortened to avoid the difficult process of authentication [12].…”
Section: Resultsmentioning
confidence: 99%
“…In this paper, we have proposed an access control system based on the concept of two-factor authentication [1]. The proposed system utilizes NFC smartphone/device (i.e.…”
Section: Discussionmentioning
confidence: 99%
“…Once the access card is lost, anyone who is in the possession of the card could easily enter the premise illegally. In this paper, we propose an access control system based on the concept of two-factor authentication [1], a security process that provides two means of identification: one of which is typically something that the user has, and the other is typically something that the user wants to be memorize or know. The proposed system uses the concept of Near field communication (NFC) and stegnography to overcome the disadvantage exhibited by the access control system using the access card.…”
Section: Introductionmentioning
confidence: 99%
“…The CA calculates NK' B with the knowledge of the random challenge N and the stored biometric key of the client and decrypts the received message to extract the claimed mobile device location L MD and time T MD (8). The CA now can verify that the received time is up-to-date and requests the mobile device location at exactly that instant in time from the cellular network operators (9). The current mobile device location L' MD is obtained from the cellular network operator by basestation/cell tower triangulation and send back to the CA.…”
Section: Biometric-based Challenge / Response Location Verificationmentioning
confidence: 99%
“…Aloul and El-Hajj proposed in [9] to use a mobile phone as a software token, which generates a one-time password (OTP) based on unique phone identifiers (IMEI, IMSI) and a username/PIN. Time is included in the OTP to ensure the one-time property and to avoid the re-use of previously generated passwords.…”
Section: Background and Related Workmentioning
confidence: 99%