SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 669
Smart-Authentication: A secure web service for providing bus pass
renewal system
Priyanka Bhunde1, Rutuja Pol2, Trupti Chandgude3,Shambhavi Nangare4 ,Prof. Shrikant
Nagure5
1Priyanka Bhunde, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India
2Rutuja Pol, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India
3Trupti Chandgude, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India
4Shambhavi Nangare, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India
5Professor Shrikant Nagure, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra,
India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Now a day we are towards the development of
smart city, so all people want everything on their finger tips
and there has been also increase in use of mobile devices like
smart phones and tablets. Web has become the dominant
interface for people to conduct their daily businesses on the
Internet or a corporate network. People use their PCs to check
email, access financial accounts, to do online shopping, all
through a web browser. In this paper We are developing an
application for bus pass renewal and we are providing Web
security using Smart-Authentication, a web authentication
scheme that exploits pervasive mobile devices and digital
cameras to counter various password attacks including man-
in-the-middleandphishingattacks. InSmart-Authentication, a
mobile device is used as the second authentication factor to
vouch for the identity of a use that is performing a web login
from a PC.
Smart-Authentication employs public key cryptography to
ensure the Security of authentication process. We
implemented a prototype systemofSmart-Authenticationthat
consists of an Android application, a Chrome browser
extension, and a Java-based web server.
Key Words: : QR-Code or Barcode, Visible Light
Communication (VLC),Phishing attack,Cryptography
web server,TFA(Two Factor Authentication).
1.INTRODUCTION
In several areas and particularly in business, Web has
become the dominant interface for people to conduct their
daily businesses on the web or company network
authentication .In general, a user authenticates herself to an
internet application hosted on a remote server by coming
into her username and positive identification in the
application’s login page (either manually or mechanically
through a positive
identification manager). positive identification has been the
First State facto methodology for net authentication [1].
However password only authentication cannot give ample
cannot give ample protection because the mechanism is at
risk
Of a range of attacks together with shoulder surfing attack
[2] To improve net authentication security and facilitate
positive identification management, thought net
browsers(e.g chrome , Firefox, and net Explorer) have
introduced integral positive identification managers
Standalone positiveidentificationManagers(e.g.,1Password
and KeyPass) and web based positive authentication
managers that run during browser.
However, a passwordmanageralonedoes notprovideample
security assurance due to insecurecomputingenvironments
at either native or remote. Zhao and Cantonese dialect
showed that none of the browser integral password
managers in thought net browsers may stop malware from
stealing passwords during a laptop setting [3]. Recent
studies on net on net positive identification automobile
filling [11] and web based password managers [4] reveal
that there exist variety of Serious vulnerabilities instandard
positive identification Managers.
In recent years we have observedthatfrequenthappeningof
knowledge breaches and positive identification info leaks
that occurred on outstanding websites similar to LinkedIn ,
Yahoo! and Gmail .Those positive identification leaks
endanger countlesspeople’s data securitynotsolelyonthose
websites however additionally on alternative websites
thanks to positive identification employ to create matters
worse, attackers usually launch MITM attack and phishing
attack to steal users’ passwords. The recent MITM attack
against Iranian Google users demonstrates that even a user
of well maintained and hardened web site may be subjected
to the MIMM attack.
Camauth consist of an android application ,a chrome
browser extension,and a java-based web server .The main
of this project to assure the security of web security while
renew a pass ,it is very cost effective and convenient to the
user .This system is made as user friendly as possible so
that anyone can use it with little knowledge of system
computers.
2. LITERATURE SURVEY
We first evaluate CamAuth using the web authentication
assessment framework proposed by Bonneau et al. [1]. We
compare e CamAuth with passwords, a most popular TFA
scheme—Google 2-step verification(2SV)[6],anda relevant
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 670
mobile device based TFA scheme—PhoneAuth (in strict
mode) [7].A barcode scanning using smartphone is already
widely used, we grant Easy-to-LearnandquasiEasy-to-Useto
CamAuth according to the definitionofthosebenefits[1]. We
believe that CamAuth (barcode scanning as user action) is
easier to use than 2SV (PIN typing as user action) even
though both have the same rating. We grant quasi
Infrequent-Errors to CamAuth, the same as all others, as
barcode scanning from either smartphone or PC is fairly
accurate and the camera performance keeps improving.
3. BACKGROUND
Two-factor authentication (TFA) requires the presentation
of two or more authentication factors: something a user
knows (e.g., a password), something a userhas(e.g.,a secure
token), and something a user is (e.g., biometric
characteristics) In this paper we are developing an
application for bus pass renewal and we are providing Web
security using Smart- Authentication, a web authentication
scheme that exploits pervasive mobile devices and digital
cameras to counter variouspasswordattacksincludingman-
in-the-middle and phishing attacks.
In Smart-Authentication, a mobile device is used as the
second authentication factor to vouch for the identity of a
use that is performing a web login from a PC. Smart
Authentication employs public key cryptography to ensure
the security of authentication process. We implemented a
prototype system of Smart-Authenticationthatconsistsof an
Android application, a Chrome browser extension, and a
Java-based web server. Recently camerabased
communications have attracted much attention given the
increasing popularity of mobile devices with one or more
built-in cameras. Barcode scanning is the primary
application domain of camera-based communications. A
barcode is an optical machine-readable representation of
information.
There are two types of barcodes: one dimensional (1D)
barcodes and two dimensional (2D) barcodes. Quick
Response code (QR code) is a popular 2D barcode. All major
Smartphone platforms support QR code scanning either
natively or through third-party applications. As camera-
based communications are short-range, highly directional,
fully observational, and immune to electromagnetic
interference, they have been appliedtosecurityapplications.
There are four main modules in project are as follows:
Fig -3.1: System architecture of bus pass system using
web server.
A. User registration:
User registration is used for KYC(know your customer) in
which you have to uploadyourdocumentslikephoto,aadhar
card and enroll your mobile number and set your useridand
password according to your wish.
B. User authentication:
In this phase user has to enter his userid and passwordifitis
correct then it will go ahead and ask for your aadharcardno,
mobile number etc it will scrutinize all details with the
details which are stored in the database.
C. CamAuth registration:
In this phase, barcode i.e QR code is generated and then it is
send to laptop through which transcation is going on and
then QRcode is also send to registered mobile number ofthe
respective user.
D .Camauth Authentication:
In this phase QRcode which is received on registered mobile
number is scanned by laptop’s webcam through the secure
visible light communication channel. If QRcodematch’sthen
it will proceed further. Then user will get choice to choose
his rout and other things related to bus pass. But theQRcode
which will be generated will be having time session if user
doesn’t enter QRcode within that time then it will get timed
out.
4. SUMMARY
Web authentication is the main part of camauth. we
presented a secure bus pass renewal system using
CamAuth.The online bus pass system will help to get a bus
passes online and reduce Endeavour. User can obtain all bus
related information through this system.It is camera based
TFA scheme that provide security of web login.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 671
Fig -4.1: Activity diagram
5. CONCLUSION
In this paper we presented a secure buspassrenewal system
using CamAuth, a camera based TFA scheme that augments
the security of web login from PC. Leveraging the high
market penetration of mobiledevicesandpervasive barcode
scanning through camera, CamAuth realizes two-factor
Authentication through passwords plus barcode scanning
using user’s mobile device. The public-keycryptography and
secure visible light communications ensure that CamAuth
can effectively defeat password stealing attacks including
man-inthe- middle and phishing attacks. CamAuth requires
no Modification to existing network protocolsandoperating
system of PC and mobile device. Our viability of the scheme.
In future, prototype system and preliminary user study
demonstrate the we plan to conduct an extensive usability
study to better understand the impact of using barcode
scanning for web login on average users physically and
psychologically.
6.REFERENCES
[1] CamAuth: Securing Web Authentication with Camera
Mengjun Xie ,Yanyan Li , Kenji Yoshigoe , Remzi Seker ,
Jiang Bian Department of Computer Science University
of Arkansas at Little Rock 2015.
[2] M. Mannan and P. van Oorschot, Leveraging personal
devices for stronger password authentication from
untrusted computers,Journal of Computer Security, vol.
19, no. 4, pp. 703–750, 2011
[3] A. Czeskis, M. Dietz, T. Kohno, D. Wallach, andD.Balfanz,
“Strengthening user authentication through
opportunistic cryptographic identity assertions”,in
Proceedings of the 2012 ACM conference on Computer
and communications security, ser. CCS ’12, 2012, pp.
404–414.
[4] B. Parno, C. Kuo, and A. Perrig, “Phoolproof phishing
Prevention”,in Proceedings of the 10th International
Conference onFinancial CryptographyandData Security
(FC 2006), 2006, pp. 1–19.
[5] J. Bonneau, C. Herley, P. C. v. Oorschot, and F. Stajano,
“The quest to replace passwords: A framework for
comparative evaluation of web authentication
schemes”,in Proceedings of the 2012 IEEE Symposiumon
Security and Privacy, 2012, pp. 553–567.
[6] F. Tari, A. A. Ozok, and S. H. Holden,”A comparison of
perceived and real shoulder-surfing risks between
alphanumeric and graphical passwords”, in Proceedings
of the Second Symposium on Usable Privacy and Security,
ser. SOUPS ’06, 2006, pp. 56–66.

More Related Content

What's hot

IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scetpankaj gamit
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET Journal
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System AuthenticationIJERA Editor
 
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyAn Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyIRJET Journal
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...IRJET Journal
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobileUvaraj Shan
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for BankingIRJET Journal
 

What's hot (19)

IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scet
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
 
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyAn Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 

Similar to Smart-Authentication: A secure web service for providing bus pass renewal system

A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodIRJET Journal
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
 
3M Secure Transportation System.
3M Secure Transportation System.3M Secure Transportation System.
3M Secure Transportation System.IRJET Journal
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGIRJET Journal
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance systemIJECEIAES
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPIRJET Journal
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection SystemIJMTST Journal
 
User Documentation Verification Portal
User Documentation Verification PortalUser Documentation Verification Portal
User Documentation Verification PortalIRJET Journal
 
QR code based authentication method for IoT applications using three security...
QR code based authentication method for IoT applications using three security...QR code based authentication method for IoT applications using three security...
QR code based authentication method for IoT applications using three security...TELKOMNIKA JOURNAL
 
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and BlockingIRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and BlockingIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 

Similar to Smart-Authentication: A secure web service for providing bus pass renewal system (20)

A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
 
3M Secure Transportation System.
3M Secure Transportation System.3M Secure Transportation System.
3M Secure Transportation System.
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
 
Randomized QR-code scanning for a low-cost secured attendance system
Randomized QR-code scanning for a low-cost secured  attendance systemRandomized QR-code scanning for a low-cost secured  attendance system
Randomized QR-code scanning for a low-cost secured attendance system
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
User Documentation Verification Portal
User Documentation Verification PortalUser Documentation Verification Portal
User Documentation Verification Portal
 
QR code based authentication method for IoT applications using three security...
QR code based authentication method for IoT applications using three security...QR code based authentication method for IoT applications using three security...
QR code based authentication method for IoT applications using three security...
 
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and BlockingIRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

Smart-Authentication: A secure web service for providing bus pass renewal system

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 669 Smart-Authentication: A secure web service for providing bus pass renewal system Priyanka Bhunde1, Rutuja Pol2, Trupti Chandgude3,Shambhavi Nangare4 ,Prof. Shrikant Nagure5 1Priyanka Bhunde, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India 2Rutuja Pol, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India 3Trupti Chandgude, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India 4Shambhavi Nangare, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India 5Professor Shrikant Nagure, Dept. of Computer Engineering, RMD Sinhgad School of Engineering, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Now a day we are towards the development of smart city, so all people want everything on their finger tips and there has been also increase in use of mobile devices like smart phones and tablets. Web has become the dominant interface for people to conduct their daily businesses on the Internet or a corporate network. People use their PCs to check email, access financial accounts, to do online shopping, all through a web browser. In this paper We are developing an application for bus pass renewal and we are providing Web security using Smart-Authentication, a web authentication scheme that exploits pervasive mobile devices and digital cameras to counter various password attacks including man- in-the-middleandphishingattacks. InSmart-Authentication, a mobile device is used as the second authentication factor to vouch for the identity of a use that is performing a web login from a PC. Smart-Authentication employs public key cryptography to ensure the Security of authentication process. We implemented a prototype systemofSmart-Authenticationthat consists of an Android application, a Chrome browser extension, and a Java-based web server. Key Words: : QR-Code or Barcode, Visible Light Communication (VLC),Phishing attack,Cryptography web server,TFA(Two Factor Authentication). 1.INTRODUCTION In several areas and particularly in business, Web has become the dominant interface for people to conduct their daily businesses on the web or company network authentication .In general, a user authenticates herself to an internet application hosted on a remote server by coming into her username and positive identification in the application’s login page (either manually or mechanically through a positive identification manager). positive identification has been the First State facto methodology for net authentication [1]. However password only authentication cannot give ample cannot give ample protection because the mechanism is at risk Of a range of attacks together with shoulder surfing attack [2] To improve net authentication security and facilitate positive identification management, thought net browsers(e.g chrome , Firefox, and net Explorer) have introduced integral positive identification managers Standalone positiveidentificationManagers(e.g.,1Password and KeyPass) and web based positive authentication managers that run during browser. However, a passwordmanageralonedoes notprovideample security assurance due to insecurecomputingenvironments at either native or remote. Zhao and Cantonese dialect showed that none of the browser integral password managers in thought net browsers may stop malware from stealing passwords during a laptop setting [3]. Recent studies on net on net positive identification automobile filling [11] and web based password managers [4] reveal that there exist variety of Serious vulnerabilities instandard positive identification Managers. In recent years we have observedthatfrequenthappeningof knowledge breaches and positive identification info leaks that occurred on outstanding websites similar to LinkedIn , Yahoo! and Gmail .Those positive identification leaks endanger countlesspeople’s data securitynotsolelyonthose websites however additionally on alternative websites thanks to positive identification employ to create matters worse, attackers usually launch MITM attack and phishing attack to steal users’ passwords. The recent MITM attack against Iranian Google users demonstrates that even a user of well maintained and hardened web site may be subjected to the MIMM attack. Camauth consist of an android application ,a chrome browser extension,and a java-based web server .The main of this project to assure the security of web security while renew a pass ,it is very cost effective and convenient to the user .This system is made as user friendly as possible so that anyone can use it with little knowledge of system computers. 2. LITERATURE SURVEY We first evaluate CamAuth using the web authentication assessment framework proposed by Bonneau et al. [1]. We compare e CamAuth with passwords, a most popular TFA scheme—Google 2-step verification(2SV)[6],anda relevant
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 670 mobile device based TFA scheme—PhoneAuth (in strict mode) [7].A barcode scanning using smartphone is already widely used, we grant Easy-to-LearnandquasiEasy-to-Useto CamAuth according to the definitionofthosebenefits[1]. We believe that CamAuth (barcode scanning as user action) is easier to use than 2SV (PIN typing as user action) even though both have the same rating. We grant quasi Infrequent-Errors to CamAuth, the same as all others, as barcode scanning from either smartphone or PC is fairly accurate and the camera performance keeps improving. 3. BACKGROUND Two-factor authentication (TFA) requires the presentation of two or more authentication factors: something a user knows (e.g., a password), something a userhas(e.g.,a secure token), and something a user is (e.g., biometric characteristics) In this paper we are developing an application for bus pass renewal and we are providing Web security using Smart- Authentication, a web authentication scheme that exploits pervasive mobile devices and digital cameras to counter variouspasswordattacksincludingman- in-the-middle and phishing attacks. In Smart-Authentication, a mobile device is used as the second authentication factor to vouch for the identity of a use that is performing a web login from a PC. Smart Authentication employs public key cryptography to ensure the security of authentication process. We implemented a prototype system of Smart-Authenticationthatconsistsof an Android application, a Chrome browser extension, and a Java-based web server. Recently camerabased communications have attracted much attention given the increasing popularity of mobile devices with one or more built-in cameras. Barcode scanning is the primary application domain of camera-based communications. A barcode is an optical machine-readable representation of information. There are two types of barcodes: one dimensional (1D) barcodes and two dimensional (2D) barcodes. Quick Response code (QR code) is a popular 2D barcode. All major Smartphone platforms support QR code scanning either natively or through third-party applications. As camera- based communications are short-range, highly directional, fully observational, and immune to electromagnetic interference, they have been appliedtosecurityapplications. There are four main modules in project are as follows: Fig -3.1: System architecture of bus pass system using web server. A. User registration: User registration is used for KYC(know your customer) in which you have to uploadyourdocumentslikephoto,aadhar card and enroll your mobile number and set your useridand password according to your wish. B. User authentication: In this phase user has to enter his userid and passwordifitis correct then it will go ahead and ask for your aadharcardno, mobile number etc it will scrutinize all details with the details which are stored in the database. C. CamAuth registration: In this phase, barcode i.e QR code is generated and then it is send to laptop through which transcation is going on and then QRcode is also send to registered mobile number ofthe respective user. D .Camauth Authentication: In this phase QRcode which is received on registered mobile number is scanned by laptop’s webcam through the secure visible light communication channel. If QRcodematch’sthen it will proceed further. Then user will get choice to choose his rout and other things related to bus pass. But theQRcode which will be generated will be having time session if user doesn’t enter QRcode within that time then it will get timed out. 4. SUMMARY Web authentication is the main part of camauth. we presented a secure bus pass renewal system using CamAuth.The online bus pass system will help to get a bus passes online and reduce Endeavour. User can obtain all bus related information through this system.It is camera based TFA scheme that provide security of web login.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 671 Fig -4.1: Activity diagram 5. CONCLUSION In this paper we presented a secure buspassrenewal system using CamAuth, a camera based TFA scheme that augments the security of web login from PC. Leveraging the high market penetration of mobiledevicesandpervasive barcode scanning through camera, CamAuth realizes two-factor Authentication through passwords plus barcode scanning using user’s mobile device. The public-keycryptography and secure visible light communications ensure that CamAuth can effectively defeat password stealing attacks including man-inthe- middle and phishing attacks. CamAuth requires no Modification to existing network protocolsandoperating system of PC and mobile device. Our viability of the scheme. In future, prototype system and preliminary user study demonstrate the we plan to conduct an extensive usability study to better understand the impact of using barcode scanning for web login on average users physically and psychologically. 6.REFERENCES [1] CamAuth: Securing Web Authentication with Camera Mengjun Xie ,Yanyan Li , Kenji Yoshigoe , Remzi Seker , Jiang Bian Department of Computer Science University of Arkansas at Little Rock 2015. [2] M. Mannan and P. van Oorschot, Leveraging personal devices for stronger password authentication from untrusted computers,Journal of Computer Security, vol. 19, no. 4, pp. 703–750, 2011 [3] A. Czeskis, M. Dietz, T. Kohno, D. Wallach, andD.Balfanz, “Strengthening user authentication through opportunistic cryptographic identity assertions”,in Proceedings of the 2012 ACM conference on Computer and communications security, ser. CCS ’12, 2012, pp. 404–414. [4] B. Parno, C. Kuo, and A. Perrig, “Phoolproof phishing Prevention”,in Proceedings of the 10th International Conference onFinancial CryptographyandData Security (FC 2006), 2006, pp. 1–19. [5] J. Bonneau, C. Herley, P. C. v. Oorschot, and F. Stajano, “The quest to replace passwords: A framework for comparative evaluation of web authentication schemes”,in Proceedings of the 2012 IEEE Symposiumon Security and Privacy, 2012, pp. 553–567. [6] F. Tari, A. A. Ozok, and S. H. Holden,”A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords”, in Proceedings of the Second Symposium on Usable Privacy and Security, ser. SOUPS ’06, 2006, pp. 56–66.