A secure OTP algorithm using a smartphone application

Hoyul Choi, Hyunsoo Kwon, Junbeom Hur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Recently, several authentication protocols are being used in mobile applications. OTP is one of the most powerful authentication methods among them. However, it has some security vulnerabilities, particularly to MITM(Man-in-the-Middle) attack and MITPC/Phone(Man-in-the-PC/Phone) attack. An adversary could know a valid OTP value and be authenticated with this secret information in the presence of those attacks. To solve these problems, we propose a novel OTP algorithm and compare it with existing algorithms. The proposed scheme is secure against MITM attack and MITPC/Phone attack by using a captcha image, IMSI number embedded in SIM card and limiting available time of an attack.

Original languageEnglish
Title of host publicationICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks
PublisherIEEE Computer Society
Pages476-481
Number of pages6
ISBN (Electronic)9781479989935
DOIs
Publication statusPublished - 2015 Aug 7
Event7th International Conference on Ubiquitous and Future Networks, ICUFN 2015 - Sapporo, Japan
Duration: 2015 Jul 72015 Jul 10

Publication series

NameInternational Conference on Ubiquitous and Future Networks, ICUFN
Volume2015-August
ISSN (Print)2165-8528
ISSN (Electronic)2165-8536

Other

Other7th International Conference on Ubiquitous and Future Networks, ICUFN 2015
CountryJapan
CitySapporo
Period15/7/715/7/10

Fingerprint

Smartphones
Authentication

Keywords

  • application
  • MITM
  • MITPhone
  • OTP
  • smart phone

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Cite this

Choi, H., Kwon, H., & Hur, J. (2015). A secure OTP algorithm using a smartphone application. In ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks (pp. 476-481). [7182589] (International Conference on Ubiquitous and Future Networks, ICUFN; Vol. 2015-August). IEEE Computer Society. https://doi.org/10.1109/ICUFN.2015.7182589

A secure OTP algorithm using a smartphone application. / Choi, Hoyul; Kwon, Hyunsoo; Hur, Junbeom.

ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, 2015. p. 476-481 7182589 (International Conference on Ubiquitous and Future Networks, ICUFN; Vol. 2015-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Choi, H, Kwon, H & Hur, J 2015, A secure OTP algorithm using a smartphone application. in ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks., 7182589, International Conference on Ubiquitous and Future Networks, ICUFN, vol. 2015-August, IEEE Computer Society, pp. 476-481, 7th International Conference on Ubiquitous and Future Networks, ICUFN 2015, Sapporo, Japan, 15/7/7. https://doi.org/10.1109/ICUFN.2015.7182589
Choi H, Kwon H, Hur J. A secure OTP algorithm using a smartphone application. In ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks. IEEE Computer Society. 2015. p. 476-481. 7182589. (International Conference on Ubiquitous and Future Networks, ICUFN). https://doi.org/10.1109/ICUFN.2015.7182589
Choi, Hoyul ; Kwon, Hyunsoo ; Hur, Junbeom. / A secure OTP algorithm using a smartphone application. ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks. IEEE Computer Society, 2015. pp. 476-481 (International Conference on Ubiquitous and Future Networks, ICUFN).
@inproceedings{a75434c30bb44974982b5a8812323cc5,
title = "A secure OTP algorithm using a smartphone application",
abstract = "Recently, several authentication protocols are being used in mobile applications. OTP is one of the most powerful authentication methods among them. However, it has some security vulnerabilities, particularly to MITM(Man-in-the-Middle) attack and MITPC/Phone(Man-in-the-PC/Phone) attack. An adversary could know a valid OTP value and be authenticated with this secret information in the presence of those attacks. To solve these problems, we propose a novel OTP algorithm and compare it with existing algorithms. The proposed scheme is secure against MITM attack and MITPC/Phone attack by using a captcha image, IMSI number embedded in SIM card and limiting available time of an attack.",
keywords = "application, MITM, MITPhone, OTP, smart phone",
author = "Hoyul Choi and Hyunsoo Kwon and Junbeom Hur",
year = "2015",
month = "8",
day = "7",
doi = "10.1109/ICUFN.2015.7182589",
language = "English",
series = "International Conference on Ubiquitous and Future Networks, ICUFN",
publisher = "IEEE Computer Society",
pages = "476--481",
booktitle = "ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks",

}

TY - GEN

T1 - A secure OTP algorithm using a smartphone application

AU - Choi, Hoyul

AU - Kwon, Hyunsoo

AU - Hur, Junbeom

PY - 2015/8/7

Y1 - 2015/8/7

N2 - Recently, several authentication protocols are being used in mobile applications. OTP is one of the most powerful authentication methods among them. However, it has some security vulnerabilities, particularly to MITM(Man-in-the-Middle) attack and MITPC/Phone(Man-in-the-PC/Phone) attack. An adversary could know a valid OTP value and be authenticated with this secret information in the presence of those attacks. To solve these problems, we propose a novel OTP algorithm and compare it with existing algorithms. The proposed scheme is secure against MITM attack and MITPC/Phone attack by using a captcha image, IMSI number embedded in SIM card and limiting available time of an attack.

AB - Recently, several authentication protocols are being used in mobile applications. OTP is one of the most powerful authentication methods among them. However, it has some security vulnerabilities, particularly to MITM(Man-in-the-Middle) attack and MITPC/Phone(Man-in-the-PC/Phone) attack. An adversary could know a valid OTP value and be authenticated with this secret information in the presence of those attacks. To solve these problems, we propose a novel OTP algorithm and compare it with existing algorithms. The proposed scheme is secure against MITM attack and MITPC/Phone attack by using a captcha image, IMSI number embedded in SIM card and limiting available time of an attack.

KW - application

KW - MITM

KW - MITPhone

KW - OTP

KW - smart phone

UR - http://www.scopus.com/inward/record.url?scp=84944681555&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84944681555&partnerID=8YFLogxK

U2 - 10.1109/ICUFN.2015.7182589

DO - 10.1109/ICUFN.2015.7182589

M3 - Conference contribution

AN - SCOPUS:84944681555

T3 - International Conference on Ubiquitous and Future Networks, ICUFN

SP - 476

EP - 481

BT - ICUFN 2015 - 7th International Conference on Ubiquitous and Future Networks

PB - IEEE Computer Society

ER -