Abstract
Security of ubiquitous computing systems is becoming more important along with extensive spread of the Internet applications. In this paper, we propose a key generation method for one-time password of Mobile-OTP systems by employing changed location and angle of fingerprint features. Fingerprint, as one powerful personal authentication tool, can create variable password keys for one-time use cyclic key permutation (CKP) of fingerprint features. Based on a set of simulations for the proposed random password key generation method, we evaluate the efficiency and strength of proposed modification for Mobile-OTP systems and describe application scenarios to support secure service.
Similar content being viewed by others
References
Cha, B. (2008). Encryption seed generation system and method using structure information of fingerprint. Korean Patent 10-0806365.
Haller, N. (1994). The S/KEY one-time password system. In Proc. symposium on network and distributed system security (pp. 151–157).
Haller, N., Matz, C., Nesser, P., & Straw, M. (1998). A one-time password system. In IETF RFC (p. 2289).
Hong, L., & Jain, A. K. (1998). Classification of fingerprint images (MSU Technical Report MSUCPS: TR98-18).
IniSafe Mobile OTP IniSafe Mobile OTP(2011). http://www.initech.com/www/html/inisafe/goMenu3_5_1.html.
Introduction to Biometrics (2011). http://ics1.mk.co.kr/file/cd104/biometrics1.pdf.
Jain, A., & Pankanti, S. (2000). Fingerprint classification and matching. In A. Bovik (Ed.), Handbook for image and video processing. San Diego: Academic Press.
JMSL (2011). http://www.vni.com/products/imsl/jmsl.html.
Mobile Authentication of BLIZZARD (2011). http://www.blizzard.co.kr.
mOTP Token Generator (2011). http://wiki.birth-online.de/software/python/motp-token-generator.
OATH (2011). http://www.openauthentication.org.
One-Time Password (OTP) (2011). http://en.wikipedia.org/wiki/One-time_password.
Oppliger, R. (2000). In Security technologies for the World Wide Web (pp. 143–145). Norwood: Artech House.
Pankanti, S., Bolle, R. M., & Jain, A. (2000). Biometrics: the future of identification. Computer, 33, 46–49.
Park, B., Han, S., & Cha, B. (2003). Discrete mathematics using computer (pp. 74–77). Seoul: Kyung Moon Publishing Company.
RSA (2011). http://www.rsa.com.
Rubin, A. D. (1995). Independent one-time passwords. In Proc. USENIX 5th UNIX security symposium (pp. 15–25).
SafeWord (2011). http://www.securecomputing.com.
SecureID (2011). http://www.rsa.com/node.aspx?id=1156.
Tittel, E., Chapple, M., & Stewart, J. M. (2003). In CISSP: certified information systems security professional (pp. 49–52). New York: Sybex.
U-OTP (2011). http://www.u-otp.co.kr.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Cha, B.R., Kim, Y.I. & Kim, J.W. Design of new P2P-enabled Mobile-OTP system using fingerprint features. Telecommun Syst 52, 2221–2236 (2013). https://doi.org/10.1007/s11235-011-9528-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-011-9528-y