Share Email Print

Proceedings Paper

dLocAuth: a dynamic multifactor authentication scheme for mCommerce applications using independent location-based obfuscation
Author(s): Torben Kuseler; Ihsan A. Lami
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

This paper proposes a new technique to obfuscate an authentication-challenge program (named LocProg) using randomly generated data together with a client's current location in real-time. LocProg can be used to enable any handsetapplication on mobile-devices (e.g. mCommerce on Smartphones) that requires authentication with a remote authenticator (e.g. bank). The motivation of this novel technique is to a) enhance the security against replay attacks, which is currently based on using real-time nonce(s), and b) add a new security factor, which is location verified by two independent sources, to challenge / response methods for authentication. To assure a secure-live transaction, thus reducing the possibility of replay and other remote attacks, the authors have devised a novel technique to obtain the client's location from two independent sources of GPS on the client's side and the cellular network on authenticator's side. The algorithm of LocProg is based on obfuscating "random elements plus a client's data" with a location-based key, generated on the bank side. LocProg is then sent to the client and is designed so it will automatically integrate into the target application on the client's handset. The client can then de-obfuscate LocProg if s/he is within a certain range around the location calculated by the bank and if the correct personal data is supplied. LocProg also has features to protect against trial/error attacks. Analysis of LocAuth's security (trust, threat and system models) and trials based on a prototype implementation (on Android platform) prove the viability and novelty of LocAuth.

Paper Details

Date Published: 8 May 2012
PDF: 9 pages
Proc. SPIE 8406, Mobile Multimedia/Image Processing, Security, and Applications 2012, 840605 (8 May 2012); doi: 10.1117/12.918130
Show Author Affiliations
Torben Kuseler, The Univ. of Buckingham (United Kingdom)
Ihsan A. Lami, The Univ. of Buckingham (United Kingdom)

Published in SPIE Proceedings Vol. 8406:
Mobile Multimedia/Image Processing, Security, and Applications 2012
Sos S. Agaian; Sabah A. Jassim; Eliza Yingzi Du, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?