A Multifactor Security Protocol for Wireless Payment-Secure Web Authentication Using Mobile Devices

  • Conference paper
  • First Online:
Cybernetics, Cognition and Machine Learning Applications

Abstract

The way we live has been reformed by smart phones. Cell phones and PDAs have been packed with ubiquity to a great extent, and consumers have now started Web-based banking, Web-based item purchasing, and other online administrations. Either the site or the remote flexible channel has been used autonomously by previous Web access authentication systems to confirm the personality of far-off clients. To get to the latest online administrations reliably needs a username and secret phrase to verify the client personality. This is a major weakness because the hidden word can be compromised and later used by the man in the center attack to make illegal entry to the record of the client. We are likely to make a validation system based on a multifaceted verification method that is both reliable and deeply accessible. It features a proprietary way to deal with rendering a validation system based on spasms (exchange recognizable proof code) and SMS (short message administration) in order to enable the conventional login/secret phrase framework to get an additional security level. In this paper, we are proposing a new system and a protocol for secure way of transactions by using multifactor authentication system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 160.49
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 210.99
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 210.99
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Article on security threats of mobile phones. http://news.zdnet.com/2100-1009_22-5602919.html

  2. Seah W Dr, Pilakkat S, Jaya Shankar P, Tan SK, Kee CS, Roy AG, Ng E (2001) The future mobile payments infrastructure a common platform for secure m-payments. A joint study by institute for communications research and systems, December 2001

    Google Scholar 

  3. Nath A, Mondal T (2016) Issues and challenges in two factor authentication algorithms. In: Proceedings of the international journal of latest trends in engineering and technology, January 2016

    Google Scholar 

  4. Adi W, Mabrouk A, Al-Qayedi A, Zahro A (2004) Combined web/mobile authentication for secure web access control. In: Proceedings of the IEEE conference held on communications and networking, pp 677–681, March 2004

    Google Scholar 

  5. Adi W, Mabrouk A, Al-Qayedi A, Zahro A (2004) Combined web/mobile authentication for secure web access control. In: Wireless communications and networking conference, IEEE Communications Society, Atlanta, GA USA, vol 2, pp 677–681, March 2004

    Google Scholar 

  6. Merugu S, Reddy MCS, Goyal E, Piplani L (2019) Text message classification using supervised machine learning algorithms. In: Kumar A, Mozar S (eds) ICCCE 2018. Lecture notes in electrical engineering, vol 500. Springer, Singapore, ISSN 1876-1100

    Google Scholar 

  7. Pu Q (2010) An improved two-factor authentication protocol. In: Proceedings of 2010 second international conference on multimedia and information technology, 24–25 April 2010

    Google Scholar 

  8. Shaik AS, Karsh RK, Suresh M, Gunjan VK (2020) LWT-DCT based image hashing for tampering localization via blind geometric correction. In: Kumar A, Senatore S, Gunjan VK (eds) ICDSMLA 2020. Lecture notes in electrical engineering, vol 783. Springer, Singapore

    Google Scholar 

  9. Halonen T (2002) A system for secure mobile payment transactions. Supervisor: Professor Teemupekka Virtanen, Helsinki University of Technology, Department of Computer Science and Engineering, January 2002

    Google Scholar 

  10. Shaik AS, Usha S (2019) Sensor based garbage disposal system. Int J Inno Technol Expl Eng (IJITEE) 8(4S2):164–167. ISSN: 2278-3075

    Google Scholar 

  11. Tiwari A, Sanyal S, Abraham A, Sanyal S, Knapskog S (2007) A multi-factor security protocol for the wireless payment-secure web authentication using mobile devices, held on February 2007, IADIS International Conference, Applied Computing 2007, Salamanca, Spain

    Google Scholar 

  12. Saxena S, Vyas S, Kumar BS, Gupta S (2019) Survey on online electronic payments security. In: Proceedings of the 2019 Amity international conference on artificial intelligence (AICAI), 4–6 Feb 2019

    Google Scholar 

  13. Devadasu G, Sushama M (2016) A novel multiple fault identification with fast Fourier transform analysis, In: 1st international conference on emerging trends in engineering, technology and science, ICETETS, 2016

    Google Scholar 

  14. Gao J, Cai J, Patel K, Shim S (2005) Wireless payment. In: Proceedings of the second international conference on embedded software and systems (ICESS’05), **an, China

    Google Scholar 

  15. Premalatha B, Babu PR, Srikanth G (2021) Compact fifth iteration fractal antenna for UWB applications. Radioelectron Commun Syst 64(6):325–329

    Google Scholar 

  16. Narayana VA, Premchand P, Govardhan A (2009) A novel and efficient approach for near duplicate page detection in web crawling. In: 2009 IEEE international advance computing conference, IACC 2009

    Google Scholar 

  17. Saba L, Sanagala SS, Gupta SK, Koppula VK, Johri AM, Sharma AM, Kolluri R, Bhatt DL, Nicolaides A, Suri JS (2021) Ultrasound-based internal carotid artery plaque characterization using deep learning paradigm on a supercomputer: a cardiovascular disease/stroke risk assessment system. Int J Cardiovasc Imag 37(5):1511–1528

    Google Scholar 

  18. Dash CSK, Behera AK, Nayak SC, Dehuri S (2021) QORA-ANN: Quasi opposition based Rao algorithm and artificial neural network for cryptocurrency prediction. In: 2021 6th International conference for convergence in technology, I2CT 2021

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. V. D. Kiran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pranith, C.V., Sujith, V.L., Kiran, K.S., Goutham, P., Kiran, K.V.D. (2023). A Multifactor Security Protocol for Wireless Payment-Secure Web Authentication Using Mobile Devices. In: Gunjan, V.K., Suganthan, P.N., Haase, J., Kumar, A. (eds) Cybernetics, Cognition and Machine Learning Applications. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1484-3_4

Download citation

Publish with us

Policies and ethics

Navigation