SlideShare a Scribd company logo
1 of 18
Enhanced adaptive security system for SMS –
based One Time Password
R.Idayathulla, MCA.,M.Phil.,(Ph.D). C. Chandrapriya, M.Phil Research Scholar
Assistant Professor, Department of Computer Science Department of Computer Science
PRIST (Deemed University), Puducherry. PRIST (Deemed University, Thanjavur.
idayathulla86@gmail.com chandrapriya2992@gmail.com
ABSTRACT
• Wireless Network is used for all Portal Electronic Devices
(PED).
• The main concept of using Authentication Network in PED
for Online Banking.
• The user authenticates the transaction has a strong static ID
and password.
• SMS based OTP provides an additional security layer for an
authorized person.
• All Banks provide the same process for security purposes for
they are beneficiaries.
• According to the recent thread, it is also vulnerable to
various attacks. In this paper how it does can happen and
what is the mechanism to prevent security-based OTP
throughout using IMEI.
• Keywords – PED, Authentication, OTP, IMEI.
INTRODUCTION
• Wireless Network is a center score of our daily life.
• In that 21st-century consciousness reformation in financial
services such as bill payment, an international fund
transaction, and money transfer.
• OTP is also calling upon as One Time Pin or Dynamic
password.
• Password veiled for only one's login session or transaction on
PED.
OTP PROCESS
• One Time Password method usually delivered to the end-user.
The process of OTP contains
1- Time Synchronization
2- Mathematical Algorithm
3- Method of Delivering the OTP.
Time Synchronization
• OTP in the concept of Time based One -Time Password
(TOTP).
• OTP is a security token and is usually identified by a piece of
hardware
• Up to till SMS based OTP delivery by as a text message.
• The temporary OTP expired after 30, 60, 240 or 380 seconds.
Mathematical Algorithm
• OTP generated in 6 or 4 digits.
• x(y),x(x(y),x(x(x(y))),…
• (a) new seed feed from the call function and it determined-
x(y).
• (b) Initial seeds - (y).
METHOD OF DELIVERING THE
OTP
Cont…
• use short Message Service (SMS) or e-mail
• OTP request is given by the user to the Web server.
• HTTP accept the post request and sent into the OTP server for
the configured bank.
• The bank server generated the OTP.
• SMS gateway accepts the OTP within the particular time
session sent int to the SMS broadcast mobile network to the
user.
VULNERABILITIES IN SMS OTP
Wireless Spoofing:
• Man-in-the-middle (MITM) attack
• IMSI catcher back cellular tower
• Unsecured Wi-Fi
Cont…
Mobile Malware:
• Malicious software that targets mobile phone or wireless-
enabled (PDA).
• Zeus-in -the -Mobile (ZitMo)
• Malware which targets mTANs
ANALYSIS OF PROBLEM
PERFORMANCE
• OTP is an electronic data.
Hacker receives the OTP
IMEI
• IMEI (International Mobile Equipment Identity) is a unique number
for all mobile phones.
• mobile phones to identify
• GSM
• WCDMA
• satellite phones and
• iDEN mobile phones
Cont…
• IMEI (15 decimal digits) number has one basic principle
purpose to identify a mobile device
• The Identification method for implement the SMS OTP in
safeguard.
• Users already registered their mobile number.
• Once permission granted only SMS gateway sent the OTP to
the receiver.
Cont…
Cont…
• The same concept of after the SMS gateway
Start sent the OTP into the registered mobile
number identification method check mobile
IMEI number, beneficiary already registered
they IMEI number with their mobile number.
RESULT AND PERFORMANCE
Mobile accouter register mobile number
• Password login session password
• Message OTP text message
• To send to the register mobile number
• IMEI register mobile IMEI number
CONCLUSION
• All over worldwide, nearly 2.71 billion Smartphone users are
present. Up to 80% of India now have they are a bank account.
• Mostly 60% of the people using the mobile Internet. In this
paper highly focuses on a high level of security and
vulnerabilities associated with SMS OTPA furtherer solution
for safeguarding OTP throughout using the IMEI method.
• This method used to prevent from some unauthorized person.
• The overall objective of our work is to give safety assurance
and both customers and baking for a user - friendly method.
Enhanced adaptive security system for SMS – based One Time Password

More Related Content

What's hot

RESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEMRESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEM
Rajesh kumar
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
Siya Agarwal
 

What's hot (12)

Atm security
Atm securityAtm security
Atm security
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
 
RESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEMRESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEM
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Atm security
Atm securityAtm security
Atm security
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
Communication security
Communication securityCommunication security
Communication security
 
Atm security
Atm securityAtm security
Atm security
 
this is test for today
this is test for todaythis is test for today
this is test for today
 

Similar to Enhanced adaptive security system for SMS – based One Time Password

SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
International Journal of Technical Research & Application
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsm
Sai Kumar
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
mmubashirkhan
 

Similar to Enhanced adaptive security system for SMS – based One Time Password (20)

Enhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time PasswordEnhanced adaptive security system for SMS – based One Time Password
Enhanced adaptive security system for SMS – based One Time Password
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Atm software
Atm softwareAtm software
Atm software
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
N044057478
N044057478N044057478
N044057478
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsm
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Review 1 Multi Level Banking (1).pptx
Review 1 Multi Level Banking (1).pptxReview 1 Multi Level Banking (1).pptx
Review 1 Multi Level Banking (1).pptx
 
One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...One time password generation using mathematical random function in sphere spa...
One time password generation using mathematical random function in sphere spa...
 
Arbina project
Arbina projectArbina project
Arbina project
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 

More from Chandrapriya Rediex (7)

5-Unit (CAB).pdf
5-Unit (CAB).pdf5-Unit (CAB).pdf
5-Unit (CAB).pdf
 
unit-4 (CAB).pdf
unit-4 (CAB).pdfunit-4 (CAB).pdf
unit-4 (CAB).pdf
 
CAB - Unit-2.pdf
CAB - Unit-2.pdfCAB - Unit-2.pdf
CAB - Unit-2.pdf
 
CAB unit-1.pdf
CAB unit-1.pdfCAB unit-1.pdf
CAB unit-1.pdf
 
Evolauion of computer converted
Evolauion of computer convertedEvolauion of computer converted
Evolauion of computer converted
 
Character set of c
Character set of cCharacter set of c
Character set of c
 
Overview of c
Overview of cOverview of c
Overview of c
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 

Enhanced adaptive security system for SMS – based One Time Password

  • 1. Enhanced adaptive security system for SMS – based One Time Password R.Idayathulla, MCA.,M.Phil.,(Ph.D). C. Chandrapriya, M.Phil Research Scholar Assistant Professor, Department of Computer Science Department of Computer Science PRIST (Deemed University), Puducherry. PRIST (Deemed University, Thanjavur. idayathulla86@gmail.com chandrapriya2992@gmail.com
  • 2. ABSTRACT • Wireless Network is used for all Portal Electronic Devices (PED). • The main concept of using Authentication Network in PED for Online Banking. • The user authenticates the transaction has a strong static ID and password. • SMS based OTP provides an additional security layer for an authorized person. • All Banks provide the same process for security purposes for they are beneficiaries. • According to the recent thread, it is also vulnerable to various attacks. In this paper how it does can happen and what is the mechanism to prevent security-based OTP throughout using IMEI. • Keywords – PED, Authentication, OTP, IMEI.
  • 3. INTRODUCTION • Wireless Network is a center score of our daily life. • In that 21st-century consciousness reformation in financial services such as bill payment, an international fund transaction, and money transfer. • OTP is also calling upon as One Time Pin or Dynamic password. • Password veiled for only one's login session or transaction on PED.
  • 4. OTP PROCESS • One Time Password method usually delivered to the end-user. The process of OTP contains 1- Time Synchronization 2- Mathematical Algorithm 3- Method of Delivering the OTP.
  • 5. Time Synchronization • OTP in the concept of Time based One -Time Password (TOTP). • OTP is a security token and is usually identified by a piece of hardware • Up to till SMS based OTP delivery by as a text message. • The temporary OTP expired after 30, 60, 240 or 380 seconds.
  • 6. Mathematical Algorithm • OTP generated in 6 or 4 digits. • x(y),x(x(y),x(x(x(y))),… • (a) new seed feed from the call function and it determined- x(y). • (b) Initial seeds - (y).
  • 8. Cont… • use short Message Service (SMS) or e-mail • OTP request is given by the user to the Web server. • HTTP accept the post request and sent into the OTP server for the configured bank. • The bank server generated the OTP. • SMS gateway accepts the OTP within the particular time session sent int to the SMS broadcast mobile network to the user.
  • 9. VULNERABILITIES IN SMS OTP Wireless Spoofing: • Man-in-the-middle (MITM) attack • IMSI catcher back cellular tower • Unsecured Wi-Fi
  • 10. Cont… Mobile Malware: • Malicious software that targets mobile phone or wireless- enabled (PDA). • Zeus-in -the -Mobile (ZitMo) • Malware which targets mTANs
  • 11. ANALYSIS OF PROBLEM PERFORMANCE • OTP is an electronic data. Hacker receives the OTP
  • 12. IMEI • IMEI (International Mobile Equipment Identity) is a unique number for all mobile phones. • mobile phones to identify • GSM • WCDMA • satellite phones and • iDEN mobile phones
  • 13. Cont… • IMEI (15 decimal digits) number has one basic principle purpose to identify a mobile device • The Identification method for implement the SMS OTP in safeguard. • Users already registered their mobile number. • Once permission granted only SMS gateway sent the OTP to the receiver.
  • 15. Cont… • The same concept of after the SMS gateway Start sent the OTP into the registered mobile number identification method check mobile IMEI number, beneficiary already registered they IMEI number with their mobile number.
  • 16. RESULT AND PERFORMANCE Mobile accouter register mobile number • Password login session password • Message OTP text message • To send to the register mobile number • IMEI register mobile IMEI number
  • 17. CONCLUSION • All over worldwide, nearly 2.71 billion Smartphone users are present. Up to 80% of India now have they are a bank account. • Mostly 60% of the people using the mobile Internet. In this paper highly focuses on a high level of security and vulnerabilities associated with SMS OTPA furtherer solution for safeguarding OTP throughout using the IMEI method. • This method used to prevent from some unauthorized person. • The overall objective of our work is to give safety assurance and both customers and baking for a user - friendly method.