Title :
CamAuth: Securing Web Authentication with Camera
Author :
Mengjun Xie ; Yanyan Li ; Yoshigoe, Kenji ; Seker, Remzi ; Jiang Bian
Author_Institution :
Dept. of Comput. Sci., Univ. of Arkansas at Little Rock, Little Rock, AR, USA
Abstract :
Frequent outbreak of password database leaks and server breaches in recent years manifests the aggravated security problems of web authentication using only password. Two-factor authentication, despite being more secure and strongly promoted, has not been widely applied to web authentication. Leveraging the unprecedented popularity of both personal mobile devices (e.g., Smartphones) and barcode scans through camera, we explore a new horizon in the design space of two-factor authentication. In this paper, we present CamAuth, a web authentication scheme that exploits pervasive mobile devices and digital cameras to counter various password attacks including man-in-the-middle and phishing attacks. In CamAuth, a mobile device is used as the second authentication factor to vouch for the identity of a use who is performing a web login from a PC. The device communicates directly with the PC through the secure visible light communication channels, which incurs no cellular cost and is immune to radio frequency attacks. CamAuth employs public-key cryptography to ensure the security of authentication process. We implemented a prototype system of CamAuth that consists of an Android application, a Chrome browser extension, and a Java-based web server. Our evaluation results indicate that CamAuth is a viable scheme for enhancing the security of web authentication.
Keywords :
Internet; authorisation; cameras; computer crime; message authentication; mobile computing; public key cryptography; smart phones; Android application; CamAuth; Chrome browser extension; Java-based Web server; Web authentication security; Web login; authentication process; barcode scans; database leaks; design space; digital cameras; man-in-the-middle attacks; password attacks; password outbreak; personal mobile devices; pervasive mobile devices; phishing attacks; public-key cryptography; radio frequency attacks; secure visible light communication channels; security problems; server breaches; smartphones; two-factor authentication; user identity; Authentication; Browsers; DH-HEMTs; Servers; Smart phones;
Conference_Titel :
High Assurance Systems Engineering (HASE), 2015 IEEE 16th International Symposium on
Conference_Location :
Daytona Beach Shores, FL
Print_ISBN :
978-1-4799-8110-6
DOI :
10.1109/HASE.2015.41