Skip to main content

A Secured Two-Factor Authentication Protocol for One-Time Money Account

  • Conference paper
  • First Online:
Proceedings of International Conference on Wireless Communication

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 19))

  • 523 Accesses

Abstract

Credentials information stealing and online banking fraud are common problem in today’s world. Two-factor authentications are used to overcome online banking frauds. But it can be easily broken by fraudster using different phishing techniques and synchronization vulnerabilities. These vulnerabilities weaken the security guarantees of smartphone based on two-factor authentication. Once authentication is broken fraudster has a direct online access of bank account with all access privileges. In this paper, we have attempted to minimize banking fraud by proposing OTM protocol for virtualization of bank account. Virtualization gives indirect and partial online access to bank account at the time of online financial transaction. OTM protocol derives virtual sub-accounts (VSA) from user bank account at the ATM machine using respective credit/debit card. Each virtual sub-account has assigned limit of maximum amount and used only one time for online banking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hayashi, E., Dhamija, R., Christin, N., Perrigo, A.: Use your illusion: secure authentication usable anywhere. In: Proceedings of ACM SOUPS (2008)

    Google Scholar 

  2. Divya, R., Muthukumarasamy, S.: An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis. In IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO) (2015)

    Google Scholar 

  3. Gao, H., Guo, X., Chen, X., Wang, L., Liu, X.: Yagp: yet another graphical password strategy. In: Proceedings of ACM ACSAC, pp. 121–129 (2008)

    Google Scholar 

  4. Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J (1988)

    Google Scholar 

  5. Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press (2008)

    Google Scholar 

  6. Bureau of Justice Statistics. Identity Theft Supplement (ITS) to the National Crime Victimization Survey

    Google Scholar 

  7. Konoth, R.K., van der Veen, V., Bos, H.: How anywhere computing just killed your phone-based two-factor authentication. In: Financial Crypto (FC) in Bandroid (2016)

    Google Scholar 

  8. White, S.N.: Secure mobile-based financial transactions, Feb 2013, US Patent 8,374,916

    Google Scholar 

  9. Maggi, F., Volpatto, A., Gasparini, S., Boracchi, G., Zanero, S.: Don’t touch a word! a practical input eavesdropping attack against mobile touchscreen devices. Politecnico di Milano, Tech. Rep. TR-2010-59 (2010)

    Google Scholar 

  10. M. Labs.: Android Malware spreads through QR code. Kaspersky Secure List Blog (2011)

    Google Scholar 

  11. Hsu, J.: How google glass can improve atm banking security. Online at google-glass-can-improve-atm-banking-security, Mar 2014, IEEE Spectrum

    Google Scholar 

  12. No Inventor.: Data compression using run length encoding and statistical encoding. US patent US4626829 A publication date DEC 1986

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Devidas Sarang or Narendra Shekokar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sarang, D., Shekokar, N. (2018). A Secured Two-Factor Authentication Protocol for One-Time Money Account. In: Vasudevan, H., Deshmukh, A., Ray, K. (eds) Proceedings of International Conference on Wireless Communication . Lecture Notes on Data Engineering and Communications Technologies, vol 19. Springer, Singapore. https://doi.org/10.1007/978-981-10-8339-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8339-6_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8338-9

  • Online ISBN: 978-981-10-8339-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics