Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
02-07-2012, 11:50 AM
Post: #1
token based authentication using mobile phone ppt
Im silpa salim,3'rd year student of B.Tech Computer Science and Engineering. Please send me the ppt for token based authentication using mobile phone..
20-09-2012, 02:46 PM
Post: #2
RE: token based authentication using mobile phone ppt
Token Based Authentication using Mobile Phone


.pdf  Token Based Authentication.pdf (Size: 219.72 KB / Downloads: 25)

Abstract:

Digital identity is the key representation of user and
getting most crucial subject for information security. The
password based authentication is weak solution and no longer
adequate. User select static password which is easy to guess and
remember, relevant information or common for all authentication
process. This simplicity makes weak authentication scheme; as so
far, static passwords are known as easiest target for attackers.
Further, Security Token based runtime interaction could extend
the strength of authentication control. Security tokens can be used
for strong authentication but inconvenient for user and costly for
the service providers. To avoid the user inconvenient and extra
cost mobile phone is an emerging alternative. These papers
comprise the study of various digital identification schemes and
give motivation to integrate mobile token. In order to establish
standard for mobile token, work starts with the review of current
schemes and explores the security architecture for strong
authentication with mobile token. Password algorithm is derived
to generate dynamic password for token authentication.
Thereafter explore various authentication mechanisms to
implement mobile token on different prospective. At the end, it
describes the various test cases and evolutionary result of various
attacks on suggested schemes.

INTRODUCTION

The enrichment of Internet, business solutions, online
services, government portals, social networking sites,
information portals are replacing the traditional way of working
and the communication. Authentication helps to establish proof
of identity. These are the way to prove that, the user, trying to
access the account is authentic. [1] Most of the solutions
comprise personal details, operational credits, certified
information or services, which requisite digital identification
for making proof of authenticity. Today, three universally
recognized philosophy are used for digital identification: what
we know (i.e. password), what we have (i.e. Tokens and cards)
and universal identity (i.e. Biometric characteristics). In order
to extend authentication strength and make work more flexible
and strong, recent work has been done on the field of virtual
identification approach (i.e. virtual token). These virtual tokens
not only help to reduce extra cost but also overcome the
problem of remembrance and keeping the token.

BACKGROUND

The concept of security is not only important but mandatory
to the success of digital solution. There is no clear definition for
strong authentication. Strong authentication is an approach to
extend security level and try to achieve security requirement. [5]
Security is not only meant for buying, exchanging or selling
products or services but also important to maintain decency of
information and system. It is also important to establish
network and communication between PCs, servers, application
and mobiles phones. Identification and authorization is the key
requirement of security[8]. Currently, solutions rely on “static
password” to establish trust and verify user authenticity. [1] User
chooses password, which is easy to guess and remember,
relevant information or common for all authentication process.
Sometime user derive password from what they have in there
mind. Strong password (i.e. @my$sit13*) is tiresome to
remember and demands hard time to handle it. People like to
store passwords into diary or take common password for all;
these are susceptible for password leek. Weak authentication
scheme may cause to exploit access level vulnerability and
liable for information leek. Furthermore, Attack methods are
generally unique to the targeted application or system, and
common techniques can be used. Attacker have multiple option
to steel passwords like spoofing, surfing, eavesdropping, brute
forcing , predicting, profile study and many more. These study
conclude that, work demand an interactive security process
which should be variant in each identification.

SMS Based Dynamic Password:

In this approach user send user id and 4 digit static passwords
to the server to retrieve dynamic password. Server verifies the
request as of user details and forwards it to password algorithm
for generation of dynamic password. By helping static
password, password algorithm generates a unique dynamic
password for individual user. Thereafter, system stores it to
VPR with user id for current session and sends it to user via
SMS. Now, user has to submit this dynamic password with user
id to gain application access. System verify requested password
with stored one and redirect to main application access.
Because VPR store dynamic password for verification, may be
vulnerable for replay attack. To overcome it, we purposed a
session time but VPR is updating in every instance of minute,
we decide to make session time for every entry. The VPR
session time out is 3 minutes and on every minute system run
updating service which deletes the outdated value from VPR. In
simple words, complete life of dynamic password is 3 minutes.

SIM Based Authentication:

It is a scheme where both dynamic password request and
response done through SMS. This proposed mechanism use
IMSI number, which are unique to each mobile phone and use
to identify the device. IMSI number is stored into SIM card
inserted into mobile phone. This number is also stored into
server database with user details
In order to gain application access, user sends 4 digit static
passwords with registered SIM to the application server via
SMS. Thereafter, server detect its IMSI number and retrieve
static password from contain. Now, server detects the existence
of IMSI number in user details and forwards the static
password to password algorithm. Thereafter, password
algorithm return 24 bits dynamic password to application
server, which store into VPR and send it to requested SIM via
SMS. Now, user gives user id and dynamic password and gain
application access.

CONCLUSION

Security is the mandatory key element to get success of any
digital solution. Authentication is the way to prove that; the
user, trying to access the account is authentic? This paper
explores the possibilities to use of mobile phone instead of
security tokens for strong authentication. Static password is no
longer secure and easily vulnerable for attackers. Security token
can be easily extending the authentication strength but extra
cost, single use and server synchronization become most
shortcoming issues. Further, hardware token is given to each
user for the respective account which increases the number of
carried tokens and the cost.
Rating token based authentication using mobile phone ppt Options
Share token based authentication using mobile phone ppt To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : info tocken com loc es, token mobile ppt, token based authentication using mobile phone report, token based authentication using mobile phones seminar topic, authentication tokensin ppt, mobile authentication ppt, token based authentication ppt, ppt on authentication token, mobile token based authentication on a budget ppt, ppt token based authentication, ppt presentation free download for token based authentication, token based authentication using mobile phone ppt, seminar topics with pdf for b tech 3 rd yr me, project on mobile phones ppt, ppt for token based authentication using mobile phone, token based authentication using mobile phone,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  6g mobile technology ppt download and abstract Guest 5 2,980 22-04-2014 02:18 PM
Last Post: Guest
  5g mobile technology documentation download Guest 25 7,455 19-04-2014 10:43 AM
Last Post: mkaasees
  full documation for cloud computing for agent based urban transportation systems Guest 7 3,027 17-04-2014 11:26 AM
Last Post: mkaasees
  document of cell phone beyond call sms technical seminar Guest 4 1,330 16-04-2014 12:51 PM
Last Post: Guest
Video mobile banking ppt free download Guest 5 1,921 03-04-2014 01:04 PM
Last Post: Guest
  future scope for density based traffic control system Guest 2 721 31-03-2014 12:00 PM
Last Post: seminar projects maker
Smile microcontroller based self centering four jaw chuck Guest 2 891 22-03-2014 06:39 PM
Last Post: Guest
  mobile bug project report Guest 2 1,981 18-03-2014 04:48 PM
Last Post: seminar projects maker
  mobile train radio communication ppt Guest 4 2,587 17-03-2014 06:50 PM
Last Post: Bharti Holi
  plc based load sharing system project Guest 3 762 15-03-2014 10:51 AM
Last Post: seminar projects maker
This Page May Contain What is token based authentication using mobile phone ppt And Latest Information/News About token based authentication using mobile phone ppt,If Not ...Use Search to get more info about token based authentication using mobile phone ppt Or Ask Here

Options: