{"title":"Modified Mobile Transaction Authentication Number System for 2-layer security","authors":"W. A. Khan, G. Shah, Y. Saleem, A. Farooq","doi":"10.1109/INTELSE.2016.7475167","DOIUrl":null,"url":null,"abstract":"Mobile phones are commonly used by web servers to validate user's identification and authentication. It enhances user's trust in online transactions and empowers him to use his mobile phone network as an additional layer of security. This mechanism is known as Mobile Transaction Authentication Number System (mTAN) which is used by e-banks and social media sites. This system has some weakness and users are still vulnerable to serious security risks. Unauthorized individuals can find their ways to get unauthorized access in traditional mTAN system. In this paper, security risks associated with current mTAN system are discussed and some modifications in existing system are proposed for using mTAN in a more secure way.","PeriodicalId":127671,"journal":{"name":"2016 International Conference on Intelligent Systems Engineering (ICISE)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Intelligent Systems Engineering (ICISE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INTELSE.2016.7475167","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Mobile phones are commonly used by web servers to validate user's identification and authentication. It enhances user's trust in online transactions and empowers him to use his mobile phone network as an additional layer of security. This mechanism is known as Mobile Transaction Authentication Number System (mTAN) which is used by e-banks and social media sites. This system has some weakness and users are still vulnerable to serious security risks. Unauthorized individuals can find their ways to get unauthorized access in traditional mTAN system. In this paper, security risks associated with current mTAN system are discussed and some modifications in existing system are proposed for using mTAN in a more secure way.