Abstract
The way we live has been reformed by smart phones. Cell phones and PDAs have been packed with ubiquity to a great extent, and consumers have now started Web-based banking, Web-based item purchasing, and other online administrations. Either the site or the remote flexible channel has been used autonomously by previous Web access authentication systems to confirm the personality of far-off clients. To get to the latest online administrations reliably needs a username and secret phrase to verify the client personality. This is a major weakness because the hidden word can be compromised and later used by the man in the center attack to make illegal entry to the record of the client. We are likely to make a validation system based on a multifaceted verification method that is both reliable and deeply accessible. It features a proprietary way to deal with rendering a validation system based on spasms (exchange recognizable proof code) and SMS (short message administration) in order to enable the conventional login/secret phrase framework to get an additional security level. In this paper, we are proposing a new system and a protocol for secure way of transactions by using multifactor authentication system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Article on security threats of mobile phones. http://news.zdnet.com/2100-1009_22-5602919.html
Seah W Dr, Pilakkat S, Jaya Shankar P, Tan SK, Kee CS, Roy AG, Ng E (2001) The future mobile payments infrastructure a common platform for secure m-payments. A joint study by institute for communications research and systems, December 2001
Nath A, Mondal T (2016) Issues and challenges in two factor authentication algorithms. In: Proceedings of the international journal of latest trends in engineering and technology, January 2016
Adi W, Mabrouk A, Al-Qayedi A, Zahro A (2004) Combined web/mobile authentication for secure web access control. In: Proceedings of the IEEE conference held on communications and networking, pp 677–681, March 2004
Adi W, Mabrouk A, Al-Qayedi A, Zahro A (2004) Combined web/mobile authentication for secure web access control. In: Wireless communications and networking conference, IEEE Communications Society, Atlanta, GA USA, vol 2, pp 677–681, March 2004
Merugu S, Reddy MCS, Goyal E, Piplani L (2019) Text message classification using supervised machine learning algorithms. In: Kumar A, Mozar S (eds) ICCCE 2018. Lecture notes in electrical engineering, vol 500. Springer, Singapore, ISSN 1876-1100
Pu Q (2010) An improved two-factor authentication protocol. In: Proceedings of 2010 second international conference on multimedia and information technology, 24–25 April 2010
Shaik AS, Karsh RK, Suresh M, Gunjan VK (2020) LWT-DCT based image hashing for tampering localization via blind geometric correction. In: Kumar A, Senatore S, Gunjan VK (eds) ICDSMLA 2020. Lecture notes in electrical engineering, vol 783. Springer, Singapore
Halonen T (2002) A system for secure mobile payment transactions. Supervisor: Professor Teemupekka Virtanen, Helsinki University of Technology, Department of Computer Science and Engineering, January 2002
Shaik AS, Usha S (2019) Sensor based garbage disposal system. Int J Inno Technol Expl Eng (IJITEE) 8(4S2):164–167. ISSN: 2278-3075
Tiwari A, Sanyal S, Abraham A, Sanyal S, Knapskog S (2007) A multi-factor security protocol for the wireless payment-secure web authentication using mobile devices, held on February 2007, IADIS International Conference, Applied Computing 2007, Salamanca, Spain
Saxena S, Vyas S, Kumar BS, Gupta S (2019) Survey on online electronic payments security. In: Proceedings of the 2019 Amity international conference on artificial intelligence (AICAI), 4–6 Feb 2019
Devadasu G, Sushama M (2016) A novel multiple fault identification with fast Fourier transform analysis, In: 1st international conference on emerging trends in engineering, technology and science, ICETETS, 2016
Gao J, Cai J, Patel K, Shim S (2005) Wireless payment. In: Proceedings of the second international conference on embedded software and systems (ICESS’05), Xian, China
Premalatha B, Babu PR, Srikanth G (2021) Compact fifth iteration fractal antenna for UWB applications. Radioelectron Commun Syst 64(6):325–329
Narayana VA, Premchand P, Govardhan A (2009) A novel and efficient approach for near duplicate page detection in web crawling. In: 2009 IEEE international advance computing conference, IACC 2009
Saba L, Sanagala SS, Gupta SK, Koppula VK, Johri AM, Sharma AM, Kolluri R, Bhatt DL, Nicolaides A, Suri JS (2021) Ultrasound-based internal carotid artery plaque characterization using deep learning paradigm on a supercomputer: a cardiovascular disease/stroke risk assessment system. Int J Cardiovasc Imag 37(5):1511–1528
Dash CSK, Behera AK, Nayak SC, Dehuri S (2021) QORA-ANN: Quasi opposition based Rao algorithm and artificial neural network for cryptocurrency prediction. In: 2021 6th International conference for convergence in technology, I2CT 2021
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pranith, C.V., Sujith, V.L., Kiran, K.S., Goutham, P., Kiran, K.V.D. (2023). A Multifactor Security Protocol for Wireless Payment-Secure Web Authentication Using Mobile Devices. In: Gunjan, V.K., Suganthan, P.N., Haase, J., Kumar, A. (eds) Cybernetics, Cognition and Machine Learning Applications. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-19-1484-3_4
Download citation
DOI: https://doi.org/10.1007/978-981-19-1484-3_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1483-6
Online ISBN: 978-981-19-1484-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)