Skip to main content
Log in

Design of new P2P-enabled Mobile-OTP system using fingerprint features

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Security of ubiquitous computing systems is becoming more important along with extensive spread of the Internet applications. In this paper, we propose a key generation method for one-time password of Mobile-OTP systems by employing changed location and angle of fingerprint features. Fingerprint, as one powerful personal authentication tool, can create variable password keys for one-time use cyclic key permutation (CKP) of fingerprint features. Based on a set of simulations for the proposed random password key generation method, we evaluate the efficiency and strength of proposed modification for Mobile-OTP systems and describe application scenarios to support secure service.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Cha, B. (2008). Encryption seed generation system and method using structure information of fingerprint. Korean Patent 10-0806365.

  2. Haller, N. (1994). The S/KEY one-time password system. In Proc. symposium on network and distributed system security (pp. 151–157).

    Google Scholar 

  3. Haller, N., Matz, C., Nesser, P., & Straw, M. (1998). A one-time password system. In IETF RFC (p. 2289).

    Google Scholar 

  4. Hong, L., & Jain, A. K. (1998). Classification of fingerprint images (MSU Technical Report MSUCPS: TR98-18).

  5. IniSafe Mobile OTP IniSafe Mobile OTP(2011). http://www.initech.com/www/html/inisafe/goMenu3_5_1.html.

  6. Introduction to Biometrics (2011). http://ics1.mk.co.kr/file/cd104/biometrics1.pdf.

  7. Jain, A., & Pankanti, S. (2000). Fingerprint classification and matching. In A. Bovik (Ed.), Handbook for image and video processing. San Diego: Academic Press.

    Google Scholar 

  8. JMSL (2011). http://www.vni.com/products/imsl/jmsl.html.

  9. Mobile Authentication of BLIZZARD (2011). http://www.blizzard.co.kr.

  10. mOTP Token Generator (2011). http://wiki.birth-online.de/software/python/motp-token-generator.

  11. OATH (2011). http://www.openauthentication.org.

  12. One-Time Password (OTP) (2011). http://en.wikipedia.org/wiki/One-time_password.

  13. Oppliger, R. (2000). In Security technologies for the World Wide Web (pp. 143–145). Norwood: Artech House.

    Google Scholar 

  14. Pankanti, S., Bolle, R. M., & Jain, A. (2000). Biometrics: the future of identification. Computer, 33, 46–49.

    Article  Google Scholar 

  15. Park, B., Han, S., & Cha, B. (2003). Discrete mathematics using computer (pp. 74–77). Seoul: Kyung Moon Publishing Company.

    Google Scholar 

  16. RSA (2011). http://www.rsa.com.

  17. Rubin, A. D. (1995). Independent one-time passwords. In Proc. USENIX 5th UNIX security symposium (pp. 15–25).

    Google Scholar 

  18. SafeWord (2011). http://www.securecomputing.com.

  19. SecureID (2011). http://www.rsa.com/node.aspx?id=1156.

  20. Tittel, E., Chapple, M., & Stewart, J. M. (2003). In CISSP: certified information systems security professional (pp. 49–52). New York: Sybex.

    Google Scholar 

  21. U-OTP (2011). http://www.u-otp.co.kr.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong Won Kim.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Cha, B.R., Kim, Y.I. & Kim, J.W. Design of new P2P-enabled Mobile-OTP system using fingerprint features. Telecommun Syst 52, 2221–2236 (2013). https://doi.org/10.1007/s11235-011-9528-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9528-y

Keywords

Navigation