CFP last date
20 December 2024
Reseach Article

Enhancing Security of E-Commerce Transactions using Noisy Password Technique

Published on August 2017 by Komal K. Kumbhare, K. V. Warkar
International Conference on Quality Up-gradation in Engineering Science and Technology
Foundation of Computer Science USA
ICQUEST2016 - Number 3
August 2017
Authors: Komal K. Kumbhare, K. V. Warkar
0d5fb3cf-e6f6-4863-b4e7-3e532ee2a5d4

Komal K. Kumbhare, K. V. Warkar . Enhancing Security of E-Commerce Transactions using Noisy Password Technique. International Conference on Quality Up-gradation in Engineering Science and Technology. ICQUEST2016, 3 (August 2017), 5-8.

@article{
author = { Komal K. Kumbhare, K. V. Warkar },
title = { Enhancing Security of E-Commerce Transactions using Noisy Password Technique },
journal = { International Conference on Quality Up-gradation in Engineering Science and Technology },
issue_date = { August 2017 },
volume = { ICQUEST2016 },
number = { 3 },
month = { August },
year = { 2017 },
issn = 0975-8887,
pages = { 5-8 },
numpages = 4,
url = { /proceedings/icquest2016/number3/28138-1675/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Quality Up-gradation in Engineering Science and Technology
%A Komal K. Kumbhare
%A K. V. Warkar
%T Enhancing Security of E-Commerce Transactions using Noisy Password Technique
%J International Conference on Quality Up-gradation in Engineering Science and Technology
%@ 0975-8887
%V ICQUEST2016
%N 3
%P 5-8
%D 2017
%I International Journal of Computer Applications
Abstract

There are different methods that are developed for authenticating the users. The most common authentication method is text-based passwords. In this method, users are asked to enter their user ID and password. But the traditional text-based passwords are vulnerable to the attacks like shoulder surfing or peeping attack, key loggers, Trojan attacks, phishing, etc. In this paper, an alternative to the static text-based passwords is used to enhance the security of e-commerce transaction. This scheme is called Noisy Passwords. Noisy password technique is resistant to the eves dropping or shoulder surfing. It consists of actual password and variable alphanumeric noise.

References
  1. Mahto, D. and Yadav, D. K. 2015. Enhancing the Security of One-Time-Password using Elliptic Curve Cryptography with Biometrics for E=Commerce Application. Third International Conference on Computer , Communication, Control and Information Technology (C3IT), 1-6
  2. Chaudhari P. P. , Hajare S. , and Bhusare P. Feb 2015. Image Based Password Authentication. International Journal of Advance Research in Computer Science and Software Engineering. vol 5, Issue 2.
  3. Thenmozi C. , Sathvi S. , and Thamotharan B. Jun-July 2013. Two Level Authentication System. International Journal of Engineering and Technology. Vol 5, no. 3, 2036-2040.
  4. Manjunath M. Ahmad K. and Suchithra. March-April 2013. Security Implementation of 3-Level Security System using Image Based Authentication. International Journal Of emerging trends and Technology in Computer Science, vol. 2, Issue 2, 401-404.
  5. Sediyono E. , Santoso K. I. , and Suhartono. 2013. Secure Login By Using One-Time Password Authentication Based on MD5 Hash Encrypted SMS. International Conference on Advances in Computing, Communication and Informatics (ICACCI), IEEE, 1604-1608.
  6. Alkhathbar K. , and Mahmoud H. A. 2009. Noisy Password Scheme: A new One Time Password System. Canadian Conference on Electrical and Computer Engineering. 841-846, IEEE.
  7. Alkhathbar K. , and Mahmoud H. A. November 2009. Noisy Password Security Technique. International Conference for Internet Technology and Secured Transactions (ICITST), 1-5. IEEE.
  8. Nitin, Sehgal V. , Chauhan D. S. , Sood M. , and Hastir V. 2008. Image Based Authentication System with Sign-In Seal. Proceedings of the World Congress on Engineering and Computer Science.
  9. Wen-Chung Kuo and Yung-Cheng Lee. August 2007. Attack and Improvement on the One-Time Password Authentication Protocol Against Theft Attacks. Proceedings of the sixth International Conference on Machine Learning and Cybernetics, IEEE.
  10. Newman R. E. , Harsh P. , and Jayaraman P. 2005. Security Analysis of and Proposal for Image Based Authentication. International Conference on Security Technology. 141-144. IEEE.
  11. Weinshall D. , and Kirkpatrick S. 2004. Passwords you'll never forget, but can't recall. In Proceedings of Conference on Human Factors in Computing System (CHI). 1399-1402. ACM.
  12. Harris J. A. 2002. OPA: A One-Time Password System. In Proceedings of International Conference on Parallel Processing Workshops (ICPPW'02). 25-29. IEEE.
  13. Dhamija R. , And Perrig A. 2000. Déjà Vu: A User Study Using Images for Authentication. In Proceedings of 9th USENIX Security Symposium.
Index Terms

Computer Science
Information Sciences

Keywords

Noisy Password E - Transaction Otp