A Location based Two-Factor L-OTP Protocol


The KIPS Transactions:PartC, Vol. 18, No. 5, pp. 327-330, Oct. 2011
10.3745/KIPSTC.2011.18.5.327,   PDF Download:

Abstract

After releasing the smart phone equipping the strong computational capability compared to traditional mobil phone, a field of services, which is available on the personal computers, is expanded to smart phone. The development of technology reduces the limited service utilization on time and space but it has a venerability exposing an information to malicious user. Especially we need to more attention when using the financial services which communicate the user`s private information. To solve the security problem, OTP(One Time Pad), which uses a private key for a session, is recommended. OTP techniques in smart phone having focused on traditional environments have been proposed and implemented. However, security over mobile environments is more vulnerable to attack and has restriction on resources than traditional system. For this reason, definition of proper conceptual OTP on smart phone is required. In the paper, we present the L-OTP(Location-OTP) protocol, using T-OTP(Time One Time Pad) technique with location information. Proposal generates the OTP using unique location information which is obtained in smart phone.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
H. J. Seo and H. W. Kim, "A Location based Two-Factor L-OTP Protocol," The KIPS Transactions:PartC, vol. 18, no. 5, pp. 327-330, 2011. DOI: 10.3745/KIPSTC.2011.18.5.327.

[ACM Style]
Hwa Jeong Seo and Ho Won Kim. 2011. A Location based Two-Factor L-OTP Protocol. The KIPS Transactions:PartC, 18, 5, (2011), 327-330. DOI: 10.3745/KIPSTC.2011.18.5.327.