Securing mobile access with interactive image code and image key encryption

Mungyu Bae, Jiyeon Lee, Suk Kyu Lee, Hwangnam Kim

Research output: Contribution to journalArticlepeer-review

Abstract

In this paper, we propose a novel anti-phishing scheme, image code-based anti-phishing scheme (ICAP), for securing mobile access through an image code. The proposed scheme can protect mobile users from phishing attack and side-glance attack which are threats to mobile environment. The proposed scheme employs the image code as the interaction between a mobile device and a server. This image code can maintain the quality of user-interface and protect the user from the side-glance attack. The proposed scheme basically uses the quick response code, which is a famous image code and has the human-unreadable property. Moreover, we propose two novel algorithms based on image code to improve our basic scheme; image key encryption, and image code identity-based encryption. The proposed scheme can choose one of two algorithms for its objective, and each algorithm has its own advantage. Image key encryption is a symmetric algorithm that can improve the transmission and encryption delay and reduces the power consumption. Image code identity-based encryption is an identity-based encryption algorithm which has the advantage of identity-based encryption. Our implementation result shows that our ICIP scheme can defend the phishing attack and side-glance attack, and shows the superiority of delay, power consumption, and accuracy.

Original languageEnglish
Pages (from-to)3412-3427
Number of pages16
JournalSecurity and Communication Networks
Volume9
Issue number16
DOIs
Publication statusPublished - 2016 Nov 10

Keywords

  • anti-phishing
  • identity-based encryption
  • image code
  • image key encryption
  • mobile security

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Securing mobile access with interactive image code and image key encryption'. Together they form a unique fingerprint.

Cite this