TY - JOUR T1 - Two Aspect Authentication System Using Secure Mobile Devices AU - Mohan, E. AU - , Ramanathan AU - Uvaraj, S. JO - International Journal of Soft Computing VL - 9 IS - 1 SP - 1 EP - 9 PY - 2014 DA - 2001/08/19 SN - 1816-9503 DO - ijscomp.2014.1.9 UR - https://makhillpublications.co/view-article.php?doi=ijscomp.2014.1.9 KW - Computer network security KW -mobile handsets KW -One-Time Password KW -smart mobile phones KW -key AB - Mobile devices are becoming more pervasive and more advanced with respect to their processing power and memory size. Relying on the personalized and trusted nature of such devices, security features can be deployed on them in order to uniquely identify a user to a service provider. In this study, researchers present a strong authentication mechanism that exploits the use of mobile devices to provide a two aspect authentication system. The approach uses a combination of One-Time Passwords as the first authentication aspect and credentials stored on a mobile device as the second aspect to offer a strong and secure authentication approach. By adding an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization. Researchers also present an analysis of the security and usability of this mechanism. The security protocol is analyzed against an adversary model; this evaluation proves that the method is safe against various attacks, most importantly key logging, shoulder surfing and phishing attacks. The simulation result evaluation shows that although, the technique does add a layer of indirectness that lessens usability; participants were willing to trade-off that usability for enhanced security once they became aware of the potential threats when using an untrusted computer. ER -