Securing mobile access with interactive image code and image key encryption

Mungyu Bae, Jiyeon Lee, Suk Kyu Lee, Hwangnam Kim

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)

    Abstract

    In this paper, we propose a novel anti-phishing scheme, image code-based anti-phishing scheme (ICAP), for securing mobile access through an image code. The proposed scheme can protect mobile users from phishing attack and side-glance attack which are threats to mobile environment. The proposed scheme employs the image code as the interaction between a mobile device and a server. This image code can maintain the quality of user-interface and protect the user from the side-glance attack. The proposed scheme basically uses the quick response code, which is a famous image code and has the human-unreadable property. Moreover, we propose two novel algorithms based on image code to improve our basic scheme; image key encryption, and image code identity-based encryption. The proposed scheme can choose one of two algorithms for its objective, and each algorithm has its own advantage. Image key encryption is a symmetric algorithm that can improve the transmission and encryption delay and reduces the power consumption. Image code identity-based encryption is an identity-based encryption algorithm which has the advantage of identity-based encryption. Our implementation result shows that our ICIP scheme can defend the phishing attack and side-glance attack, and shows the superiority of delay, power consumption, and accuracy.

    Original languageEnglish
    Pages (from-to)3412-3427
    Number of pages16
    JournalSecurity and Communication Networks
    Volume9
    Issue number16
    DOIs
    Publication statusPublished - 2016 Nov 10

    Bibliographical note

    Publisher Copyright:
    Copyright © 2016 John Wiley & Sons, Ltd.

    Keywords

    • anti-phishing
    • identity-based encryption
    • image code
    • image key encryption
    • mobile security

    ASJC Scopus subject areas

    • Information Systems
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Securing mobile access with interactive image code and image key encryption'. Together they form a unique fingerprint.

    Cite this