
Proceedings Paper
dLocAuth: a dynamic multifactor authentication scheme for mCommerce applications using independent location-based obfuscationFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
This paper proposes a new technique to obfuscate an authentication-challenge program (named LocProg) using randomly
generated data together with a client's current location in real-time. LocProg can be used to enable any handsetapplication
on mobile-devices (e.g. mCommerce on Smartphones) that requires authentication with a remote
authenticator (e.g. bank). The motivation of this novel technique is to a) enhance the security against replay attacks,
which is currently based on using real-time nonce(s), and b) add a new security factor, which is location verified by two
independent sources, to challenge / response methods for authentication. To assure a secure-live transaction, thus
reducing the possibility of replay and other remote attacks, the authors have devised a novel technique to obtain the
client's location from two independent sources of GPS on the client's side and the cellular network on authenticator's
side. The algorithm of LocProg is based on obfuscating "random elements plus a client's data" with a location-based
key, generated on the bank side. LocProg is then sent to the client and is designed so it will automatically integrate into
the target application on the client's handset. The client can then de-obfuscate LocProg if s/he is within a certain range
around the location calculated by the bank and if the correct personal data is supplied. LocProg also has features to
protect against trial/error attacks. Analysis of LocAuth's security (trust, threat and system models) and trials based on a
prototype implementation (on Android platform) prove the viability and novelty of LocAuth.
Paper Details
Date Published: 8 May 2012
PDF: 9 pages
Proc. SPIE 8406, Mobile Multimedia/Image Processing, Security, and Applications 2012, 840605 (8 May 2012); doi: 10.1117/12.918130
Published in SPIE Proceedings Vol. 8406:
Mobile Multimedia/Image Processing, Security, and Applications 2012
Sos S. Agaian; Sabah A. Jassim; Eliza Yingzi Du, Editor(s)
PDF: 9 pages
Proc. SPIE 8406, Mobile Multimedia/Image Processing, Security, and Applications 2012, 840605 (8 May 2012); doi: 10.1117/12.918130
Show Author Affiliations
Torben Kuseler, The Univ. of Buckingham (United Kingdom)
Ihsan A. Lami, The Univ. of Buckingham (United Kingdom)
Published in SPIE Proceedings Vol. 8406:
Mobile Multimedia/Image Processing, Security, and Applications 2012
Sos S. Agaian; Sabah A. Jassim; Eliza Yingzi Du, Editor(s)
© SPIE. Terms of Use
