Secure scheme for user authentication and authorization in android environment

Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. It has been seen that currently majority of the authentication and authorization techniques are usually designed on...

Full description

Bibliographic Details
Main Authors: Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi
Format: Article
Language:English
Published: IJERA 2013
Subjects:
Online Access:http://irep.iium.edu.my/32551/
http://irep.iium.edu.my/32551/
http://irep.iium.edu.my/32551/1/humairadas.pdf
id iium-32551
recordtype eprints
spelling iium-325512014-07-16T02:56:02Z http://irep.iium.edu.my/32551/ Secure scheme for user authentication and authorization in android environment Dar, Humaira Al-Khateeb, Wajdi Fawzi Mohammed Habaebi, Mohamed Hadi TK5101 Telecommunication. Including telegraphy, radio, radar, television Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. It has been seen that currently majority of the authentication and authorization techniques are usually designed on the top of One Time Password on user trusted hand held device. However, due to various lethal threats on mobile security systems, it can be said that existing security is not sufficient. Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security. Experimented on java platform, the implementation techniques discussed in the paper are found to be very robust IJERA 2013-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/32551/1/humairadas.pdf Dar, Humaira and Al-Khateeb, Wajdi Fawzi Mohammed and Habaebi, Mohamed Hadi (2013) Secure scheme for user authentication and authorization in android environment. International Journal of Engineering Research and Application, 3 (5). pp. 1874-1882. ISSN 2248-9622 http://www.ijera.com/papers/Vol3_issue5/KX3518741881.pdf
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic TK5101 Telecommunication. Including telegraphy, radio, radar, television
spellingShingle TK5101 Telecommunication. Including telegraphy, radio, radar, television
Dar, Humaira
Al-Khateeb, Wajdi Fawzi Mohammed
Habaebi, Mohamed Hadi
Secure scheme for user authentication and authorization in android environment
description Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. It has been seen that currently majority of the authentication and authorization techniques are usually designed on the top of One Time Password on user trusted hand held device. However, due to various lethal threats on mobile security systems, it can be said that existing security is not sufficient. Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security. Experimented on java platform, the implementation techniques discussed in the paper are found to be very robust
format Article
author Dar, Humaira
Al-Khateeb, Wajdi Fawzi Mohammed
Habaebi, Mohamed Hadi
author_facet Dar, Humaira
Al-Khateeb, Wajdi Fawzi Mohammed
Habaebi, Mohamed Hadi
author_sort Dar, Humaira
title Secure scheme for user authentication and authorization in android environment
title_short Secure scheme for user authentication and authorization in android environment
title_full Secure scheme for user authentication and authorization in android environment
title_fullStr Secure scheme for user authentication and authorization in android environment
title_full_unstemmed Secure scheme for user authentication and authorization in android environment
title_sort secure scheme for user authentication and authorization in android environment
publisher IJERA
publishDate 2013
url http://irep.iium.edu.my/32551/
http://irep.iium.edu.my/32551/
http://irep.iium.edu.my/32551/1/humairadas.pdf
first_indexed 2023-09-18T20:46:58Z
last_indexed 2023-09-18T20:46:58Z
_version_ 1777409739424006144