Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2659651.2659743acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A Novel Authentication Scheme for Online Transactions

Published: 09 September 2014 Publication History
  • Get Citation Alerts
  • Abstract

    In this paper, we describe a novel method of approving and finalising financial transactions that would raise the bar for any potential attackers. The proposed scheme is based on the hypothesis that it would be significantly harder for an attacker to compromise two hardware devices or monitor and interfere with two communication channels at the same time. This will allow the users of this method to initiate a transaction on the Internet and then use their mobile phone in order to sanction the transfer of funds to a different account. In contrast to Two-Factor Authentication systems, this scheme does not require the online submission of any information that is received by the user's device but directly interacts through the mobile phone network. For this purpose the user's mobile phone has an additional encryption layer that allows it to communicate securely with the server side and convey the user's consent for a certain transaction. This ensures that the two channels and the authentication factors are kept independent. Therefore, even if the user's computer is compromised an attacker would not be able to set a fraudulent transaction without actually having the user's mobile phone and the unique data that are generated by the device.

    References

    [1]
    Al Fairuz, Mohamed and Renaud, Karen. Multi-channel, Multi-level Authentication for More Secure eBanking. (2010), ISSA.
    [2]
    Anderson, Ross J. Why Cryptosystems Fail. Communications of the ACM, 37, 11 (1994), 32--40.
    [3]
    Binsalleeh, Hamad, Ormerod, Thomas, Boukhtouta, Amine, Sinha, Prosenjit, Youssef, Amr, Debbabi, Mourad, and Wang, Lingyu. On the analysis of the zeus botnet crimeware toolkit. In Eighth Annual International Conference on Privacy Security and Trust (PST) (31-38 2010), IEEE.
    [4]
    CAPGEMINI & ROYAL BANK OF SCOTLAND. World Payments Report. 2013.
    [5]
    Dhamija, Rachna, Tygar, J. Doug, and Hearst, Marti. Why Phishing Works. In Proceedings of the SIGCHI conference on Human Factors in Computing (2006), ACM, 581--590.
    [6]
    Dougan, Timothy and Curran, Kevin. Man in the Browser Attacks. International Journal of Ambient Computing and Intelligence (IJACI), 4, 1 (2012), 29--39.
    [7]
    Florencio, Dinei and Herley, Cormac. A large-scale study of web password habits. In Proceedings of the 16th international conference on World Wide Web (WWW '07) (New York, NY, USA 2007), ACM, 657--666.
    [8]
    Ives, Blake, Walsh, Kenneth R, and Schneider, Helmut. The domino effect of password reuse. Communications of the ACM, 47, 4 (2004), 75--78.
    [9]
    M'Raihi, D, Bellare, M, Hoornaert, F, Naccache, D, and Ranen, O. Hotp: An hmac-based one-time password algorithm. The Internet Society, Network Working Group. RFC4226 (2005).
    [10]
    Meyer, Ulrike and Wetzel, Susanne. A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on Wireless security (2004), ACM, 90--97.
    [11]
    Nohl, Karsten and Paget, Chris. Gsm: Srsly. (Berlin 2009), 26th Chaos Communication Congress.
    [12]
    Schneier, Bruce. Two-factor authentication: too little, too late. Communications of the ACM (2005).

    Index Terms

    1. A Novel Authentication Scheme for Online Transactions

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
      September 2014
      518 pages
      ISBN:9781450330336
      DOI:10.1145/2659651
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 09 September 2014

      Check for updates

      Author Tags

      1. AES
      2. Financial Transaction
      3. Fraud Mitigation
      4. Hash Algorithm
      5. Out of Band Authentication
      6. Public Key Cryptography
      7. RSA
      8. SHA
      9. Symmetric Cryptography
      10. Two Channel Authentication
      11. Two Factor Authentication

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      SIN '14

      Acceptance Rates

      SIN '14 Paper Acceptance Rate 32 of 109 submissions, 29%;
      Overall Acceptance Rate 102 of 289 submissions, 35%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 124
        Total Downloads
      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media