Browse > Article
http://dx.doi.org/10.14400/JDC.2015.13.8.315

Designed OTP Generation Method Using Health Information  

Choo, Yeun-Su (Dept. of Computer Graduate School Soongsil University)
Kang, Jung-Ho (Dept. of Computer Graduate School Soongsil University)
Kim, Kyoung-Hun (Dept. of Computer Information, Gangdong University)
Park, Jea-Pyo (Graduate School of Information Sciences Soongsil University)
Jun, Moon-Seog (Dept. of Computer Graduate School Soongsil University)
Publication Information
Journal of Digital Convergence / v.13, no.8, 2015 , pp. 315-320 More about this Journal
Abstract
User Authentication in Online service is essential for accurate and safe service. For this user authentication, One Time Password(OTP) is frequently used. To satisfy one-time-use characteristic of OTP, Offset information to generate OTP or final OTP value get generated through OTP generator or security card which could be lost. In this study, OTP generation method that bypasses OTP generator or security card by using health information collected from u-Health care system is proposed. Suggestion is that health information collected through wearable devices get utilized to offset information that are applied in OTP generations. OTP generated using suggested methods showed similar results than current OTP generation methods in the collision resistance test which tests how often it generate same authentication numbers, this implies that new proposed method can be applied to various on-line services.
Keywords
OTP; Convergence User Authentication; Health Information; Collision resistance; u-Health;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Han-na You, Jae-Sik Lee, Jung-Jae Kim, Jae-Pio, Moon-Seog Jun, A Study on the Two-Channel Authentication Method which Provides Two-way Authentication using Mobile Certificate int Internet Banking Environment, The Journal of Korea Information and Communications Society, Vol. 36, No. 8, pp. 939-946, 2011.   DOI   ScienceOn
2 Shirly Lee, Ivy Ong, HyoTaek Lim, HoonJae Lee, International Journal of KIMICS, Vol. 8, No. 4, pp 427-432, 2010.
3 DOI: http://www.ietf.org/rfc/rfc2289.txt
4 DOI: http://www.ietf.org/rfc/rfc4226.txt
5 DOI: http://www.ietf.org/rfc/rfc6238.txt
6 TTA, u-Health Service Reference Model , TTA, 2010
7 TTA, Information Security Reference Model for u-Health Service, TTA, 2011.6
8 So-Yeon Min, Byung-Wook Jin, "Disign of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment", Journal of the Korea Academia-Industrial cooperation Society, Vol 15, No 6, pp.3865-3871, 2014   DOI   ScienceOn
9 M. Tubaishat, S. Madria, Sensor Networks: An Overview, IEEE Potentials, Vol. 22, Issue. 2, 20-23, 2003.   DOI
10 Dong-Min Shin, Dong-Il Shin, Dong-Kyoo Shin, Development of u-Health Care System for Dementia Patients, The Journal of Korea Information and Communications Society, Vol. 38C, No. 12, pp.1106-1113, 2013.   DOI   ScienceOn
11 Hyeon-Suk Jang, Tae-Hak Ban, Se-Cheol Jang, Hoe-Kyung Jung, Journal of the Korea Institute of Information and Communication Engineering, Vol. 17, No. 11, pp. 2693-2698, 2013.   DOI   ScienceOn
12 Yun-Young Sok, Seok-Hun Kim, Integrated Medical Information System Implementation for the u-Healthcare Service Environment, Journal of the Korea Contents Association, Vol. 14, No. 5, pp.1-7, 2014.   DOI
13 TTA, Algorithm Profile for a one-time password, TTA, 2012.12
14 TTA, Road map for the one time password standards,TTA, 2011.12
15 R. Rivest "The MD5 message digest alrogithm." Requests for Comments(RFC) 1321, 1992.
16 Behrouz A. Forouzan, Cryptography and Network Security(International Edition), pp.377-398, McGraw-Hill, 2008.