{"title":"Increasing the efficiency of One-time key Issuing for The First Verification Caller ID Spoofing Attacks","authors":"Narongsak Sukma, R. Chokngamwong","doi":"10.1109/JCSSE.2018.8457341","DOIUrl":null,"url":null,"abstract":"Nowadays, verifying the owner of every phone number is still possible only by showing the phone number on the screen. The telephone networks today do not have a proper validation process. This is a critical vulnerability for attackers to use this vulnerability to fake a phone number to deceive themselves as someone, i.e., a government agency and trick people into believing and eventually transferring money. Based on this problem, the research team has researched and found that many kinds of research have tried to solve the problem using a short message. (SMS), time spent on user response, hardware usage, and digital signature verification. However, the research team presented a new conceptual model as a onetime password authentication model for authentication. This new approach can reduce the need for external hardware, learning time and response time without the use of an external CA or a certification authority. This paper base on our previous paper [1] has a point that needed for improvement in the first time verification process. We propose a model that adds the ability to the first verification called advisory system which uses statistics to assist responsiveness to unknown calls. The testing result has shown the presence of fraud detection at the first call. The performance of the system is satisfied because the mobile phone that has this monitoring system installed still usually operates. Temperature, resources usage, and power consumption are not affected.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JCSSE.2018.8457341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, verifying the owner of every phone number is still possible only by showing the phone number on the screen. The telephone networks today do not have a proper validation process. This is a critical vulnerability for attackers to use this vulnerability to fake a phone number to deceive themselves as someone, i.e., a government agency and trick people into believing and eventually transferring money. Based on this problem, the research team has researched and found that many kinds of research have tried to solve the problem using a short message. (SMS), time spent on user response, hardware usage, and digital signature verification. However, the research team presented a new conceptual model as a onetime password authentication model for authentication. This new approach can reduce the need for external hardware, learning time and response time without the use of an external CA or a certification authority. This paper base on our previous paper [1] has a point that needed for improvement in the first time verification process. We propose a model that adds the ability to the first verification called advisory system which uses statistics to assist responsiveness to unknown calls. The testing result has shown the presence of fraud detection at the first call. The performance of the system is satisfied because the mobile phone that has this monitoring system installed still usually operates. Temperature, resources usage, and power consumption are not affected.