About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Mobile Wireless Middleware, Operating Systems, and Applications. Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30 - July 2, 2010. Revised Selected Papers

Research Article

A Secure Mobile OTP Token

Download(Requires a free EAI acccount)
849 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-17758-3_1,
        author={Fred Cheng},
        title={A Secure Mobile OTP Token},
        proceedings={Mobile Wireless Middleware, Operating Systems, and Applications. Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30 - July 2, 2010. Revised Selected Papers},
        proceedings_a={MOBILWARE},
        year={2012},
        month={10},
        keywords={One-time Password OTP Token Authentication Encryption Algorithm MITM Attack Shoulder-surfing Attack Security Attack},
        doi={10.1007/978-3-642-17758-3_1}
    }
    
  • Fred Cheng
    Year: 2012
    A Secure Mobile OTP Token
    MOBILWARE
    Springer
    DOI: 10.1007/978-3-642-17758-3_1
Fred Cheng1,*
  • 1: International Technological University and FPC Consultancy
*Contact email: fredtcheng@yahoo.com

Abstract

Implementing a mobile One-time Password (OTP) Token on a cellular phone is a hot topic since the past few years. The proposed solutions had made certain improvements on network security. But none of them can fully prevent the OTP seed (K) tracing from MIMT OTP code interception or Shoulder-surfing security attacks while also meet the following criteria – fully compliant with existing authentication systems, inter-operable with other token and easy to deploy or support. This paper presents a cipher called Rubbing Encryption Algorithm (REAL) and the implementation of a Mobile OTP Token using this algorithm. The newly designed REAL Mobile OTP Token addresses and improves the aforementioned issues successfully.

Keywords
One-time Password OTP Token Authentication Encryption Algorithm MITM Attack Shoulder-surfing Attack Security Attack
Published
2012-10-17
http://dx.doi.org/10.1007/978-3-642-17758-3_1
Copyright © 2010–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL