Explore chapters and articles related to this topic
Password Management
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
One of the most important benefits of using the OTP is that it cannot be reused for cyberattacks or any other malicious activities. Hence, tracking the OTP numbers will not be harmful for your account security. Even if all the past OTP generated by you are exposed to the cyber hackers, that will not make any difference at all! The attacker would still be clueless.
Rain Drop Service and Biometric Verification Based Blockchain Technology for Securing the Bank Transactions from Cyber Crimes Using Weighted Fair Blockchain (WFB) Algorithm
Published in Cybernetics and Systems, 2023
The author Guo et al. (2018) proposed a novel fraud hazard tracking device for e-banking transactions. The model of score rules for online and offline historical transactions are blended collectively score, a fraud detection scoring model is introduced for fraud monitoring and parallel random version for fraud classifier training and designed Kafka–Spark–MPP Gbase (KSMG) framework for the offline information process of machine learning. Short Message Service (SMS) based on One Time Password (OTP) services were introduced to counter phishing and other attacks against authentication and authorization of Internet services. Shield is another authentication method for transaction authorization numbers. Biometric technology such as fingerprints has accelerated at an immense pace for authentication and identification of e-banking systems. But it fails to preserve the integrity of their transactions. In proposed system for biometric verification, the biometric input must be matched with the actual test image of the user. Initially, biometric image of the user who make transaction will be provided, that image will then convert into Grayscale image. For that grayscale, histogram is calculated. Then, Euclidean distance between data and test image is predicted to make sure that the user is authorized person or not. If the user is authorized person, then the user will be given authorization to make transactions.
A secure and efficient authentication and multimedia data sharing approach in IoT-healthcare
Published in The Imaging Science Journal, 2023
Sangeetha Yempally, Sanjay Kumar Singh, Velliangiri Sarveshwaran
If , and the user is verified then the IoT server generates a One Time Password (OTP) to the user. The OTP is generated by hashing the concatenated user ID and public key , and then the obtained hashed output is XORed with the mod function of the security parameter , and is represented as, The generated OTP is forwarded to the user and is saved as . In the IoT server if subsequently the user is authenticated. Figure 10 illustrates the authentication phase for multimedia data sharing in IoT healthcare.
Improving cloud data security through hybrid verification technique based on biometrics and encryption system
Published in International Journal of Computers and Applications, 2022
Md. Alamgir Hossain, Md. Abdullah Al Hasan
Our contributions are summarized below: We propose a new user verification architecture for valid user authentication to prevent accessing data by unauthorized user and enhance data security by a convenient hybrid system.We incorporate both biometric verification and encryption strategy in a single system to ensure valid user authentication.Used one-time password (OTP) as secret key for enhance system security.For the cloud security, more than 10 methods are studied and selected bests from them.In the result verification section, our provided system ensures the efficiency and verifiable guarantee.Finally, we process the average time of our proposed framework and contrast with the different existing framework with checking the performance and get a positive outcome from it.