Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Enhancing Security of E-Commerce Transactions using Noisy Password Technique

Print
PDF
IJCA Proceedings on International Conference on Quality Up-gradation in Engineering Science and Technology
© 2017 by IJCA Journal
ICQUEST 2016 - Number 3
Year of Publication: 2017
Authors:
Komal K. Kumbhare
K. V. Warkar

Komal K Kumbhare and K V Warkar. Article: Enhancing Security of E-Commerce Transactions using Noisy Password Technique. IJCA Proceedings on International Conference on Quality Up-gradation in Engineering Science and Technology ICQUEST 2016(3):5-8, August 2017. Full text available. BibTeX

@article{key:article,
	author = {Komal K. Kumbhare and K. V. Warkar},
	title = {Article: Enhancing Security of E-Commerce Transactions using Noisy Password Technique},
	journal = {IJCA Proceedings on International Conference on Quality Up-gradation in Engineering Science and Technology},
	year = {2017},
	volume = {ICQUEST 2016},
	number = {3},
	pages = {5-8},
	month = {August},
	note = {Full text available}
}

Abstract

There are different methods that are developed for authenticating the users. The most common authentication method is text-based passwords. In this method, users are asked to enter their user ID and password. But the traditional text-based passwords are vulnerable to the attacks like shoulder surfing or peeping attack, key loggers, Trojan attacks, phishing, etc. In this paper, an alternative to the static text-based passwords is used to enhance the security of e-commerce transaction. This scheme is called Noisy Passwords. Noisy password technique is resistant to the eves dropping or shoulder surfing. It consists of actual password and variable alphanumeric noise.

References

  • Mahto, D. and Yadav, D. K. 2015. Enhancing the Security of One-Time-Password using Elliptic Curve Cryptography with Biometrics for E=Commerce Application. Third International Conference on Computer , Communication, Control and Information Technology (C3IT), 1-6
  • Chaudhari P. P. , Hajare S. , and Bhusare P. Feb 2015. Image Based Password Authentication. International Journal of Advance Research in Computer Science and Software Engineering. vol 5, Issue 2.
  • Thenmozi C. , Sathvi S. , and Thamotharan B. Jun-July 2013. Two Level Authentication System. International Journal of Engineering and Technology. Vol 5, no. 3, 2036-2040.
  • Manjunath M. Ahmad K. and Suchithra. March-April 2013. Security Implementation of 3-Level Security System using Image Based Authentication. International Journal Of emerging trends and Technology in Computer Science, vol. 2, Issue 2, 401-404.
  • Sediyono E. , Santoso K. I. , and Suhartono. 2013. Secure Login By Using One-Time Password Authentication Based on MD5 Hash Encrypted SMS. International Conference on Advances in Computing, Communication and Informatics (ICACCI), IEEE, 1604-1608.
  • Alkhathbar K. , and Mahmoud H. A. 2009. Noisy Password Scheme: A new One Time Password System. Canadian Conference on Electrical and Computer Engineering. 841-846, IEEE.
  • Alkhathbar K. , and Mahmoud H. A. November 2009. Noisy Password Security Technique. International Conference for Internet Technology and Secured Transactions (ICITST), 1-5. IEEE.
  • Nitin, Sehgal V. , Chauhan D. S. , Sood M. , and Hastir V. 2008. Image Based Authentication System with Sign-In Seal. Proceedings of the World Congress on Engineering and Computer Science.
  • Wen-Chung Kuo and Yung-Cheng Lee. August 2007. Attack and Improvement on the One-Time Password Authentication Protocol Against Theft Attacks. Proceedings of the sixth International Conference on Machine Learning and Cybernetics, IEEE.
  • Newman R. E. , Harsh P. , and Jayaraman P. 2005. Security Analysis of and Proposal for Image Based Authentication. International Conference on Security Technology. 141-144. IEEE.
  • Weinshall D. , and Kirkpatrick S. 2004. Passwords you'll never forget, but can't recall. In Proceedings of Conference on Human Factors in Computing System (CHI). 1399-1402. ACM.
  • Harris J. A. 2002. OPA: A One-Time Password System. In Proceedings of International Conference on Parallel Processing Workshops (ICPPW'02). 25-29. IEEE.
  • Dhamija R. , And Perrig A. 2000. Déjà Vu: A User Study Using Images for Authentication. In Proceedings of 9th USENIX Security Symposium.