본문 바로가기
  • Home

The Authentication Model which Utilized Tokenless OTP

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2007, 12(1), pp.109-118
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science

김기환 1 박대우 1

1호서대학교

Accredited

ABSTRACT

Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password .Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity.Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

Citation status

* References for papers published after 2023 are currently being built.