scholarly journals OTENTIKASI SISTEM DENGAN MENGGUNAKAN ONE TIME PASSWORD MEMANFAATKAN SMARTPHONE ANDROID

LINK ◽  
2018 ◽  
Vol 24 (1) ◽  
pp. 4
Author(s):  
Mohammad Noor Al Azam
Keyword(s):  

Seiring perkembangan Teknologi Informasi yang begitu pesat, dan pertumbuhan infrastruktur di dunia maya, perkembangan situs juga semakin bertambah. Semakin banyak situs yang ada, membuat pengguna internet harus memiliki akun di berbagai situs tersebut. Dengan banyaknya akun, maka semakin banyak pula password yang harus dihapalkan untuk melakukan login. Hal ini membuat semakin sulit pula untuk mengingat username dan password. Selain itu, dengan semakin banyaknya username dan password yang harus diingat, membuat pengguna lebih memilih password yang mudah diingatnya. Atau pengguna cenderung menggunakan fasilitas “keep login” pada sebuah situs agar tidak selalu memasukkan password . Hal ini tentu saja membuat resiko bobolnya akun pengguna tersebut lebih besar. Untuk itu penulis berinovasi untuk membuat sebuah aplikasi dengan memanfaatkan smartphone android yang tersinkronisasi dengan server, dan dapat memberi solusi pada masalah tersebut. Pengguna tidak lagi perlu menghafal masing-masing password untuk masing-masing situs. Pengguna cukup memilih situs yang akan dimasukinya pada sebuah aplikasi Android, dan aplikasi itu akan melakukan sinkronisasi dengan server dan memberikan one time password (OTP) yang hanya berlaku selama 5 menit.Kata Kunci : One Time Password, Synchronize Password, Android

2014 ◽  
Vol 2014 ◽  
pp. 1-16
Author(s):  
Peer Azmat Shah ◽  
Halabi B. Hasbullah ◽  
Ibrahim A. Lawal ◽  
Abubakar Aminu Mu’azu ◽  
Low Tang Jung

Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO).


Author(s):  
SARIKA KHALADKAR ◽  
SARITA MALUNJKAR ◽  
POOJA SHINGOTE

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. This helps to eliminate tempest attack, shoulder attack, Brute-force attack. Using the instant messaging service available in internet, user will obtain the One Time Password (OTP) after image authentication. This OTP then can be used by user to access their personal accounts. The image based authentication method relies on the user’s ability to recognize pre-chosen categories from a grid of pictures. This paper integrates Image based authentication and HMAC based one time password to achieve high level of security in authenticating the user over the internet.


2011 ◽  
Author(s):  
D. M'Raihi ◽  
S. Machani ◽  
M. Pei ◽  
J. Rydell
Keyword(s):  

Author(s):  
Ali A. Yassin ◽  
Hai Jin ◽  
Ayad Ibrahim ◽  
Weizhong Qiang ◽  
Deqing Zou
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document