HMAC-based 3-factor Authentication using OTP
نویسندگان
چکیده
منابع مشابه
HMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملhmac-based authentication protocol: attacks and improvements
as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...
متن کاملHMAC Based Secure Authentication of VANET's
The Vehicular Ad-hoc Network (VANET) has been studied in many fields since it has the ability to provide a variety of services, such as detecting oncoming collisions and providing warning signals to alert the driver. The services provided by VANET are often based on collaboration among vehicles that are equipped with relatively simple motion sensors and GPS units. Awareness of its precise locat...
متن کاملImplementing Strong Authentication with OTP: Integrated System
Due to the arising problems with using static passwords, there is a strong need of implementing more secure protocols for authentication. The One-Time Password protocol is implementation for two-factor authentication; the two factors being something you own (a token) and something you know (PIN). This paper presents an open algorithm for OTP and implements a clientserver system for secure OTP a...
متن کاملMessage Authentication Using Hash Functions| the Hmac Construction
Two parties communicating across an insecure channel need a method by which any attempt to modify the information sent by one to the other, or fake its origin, is detected. Most commonly such a mechanism is based on a shared key between the parties, and in this setting is usually called a MAC, or Message Authentication Code. (Other terms include Integrity Check Value or Cryptographic Checksum)....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Academia-Industrial cooperation Society
سال: 2009
ISSN: 1975-4701
DOI: 10.5762/kais.2009.10.12.3708