Page 639 - Emerging Trends and Innovations in Web-Based Applications and Technologies
P. 639

International Journal of Trend in Scientific Research and Development (IJTSRD)
               Special Issue on Emerging Trends and Innovations in Web-Based Applications and Technologies
                                       Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470

                      A Comprehensive Approach to Transaction Security
                                 Enhancement Using OTP Mechanisms

                                                   1
                                                                    2
                                                                                     3
                                      Alok Mishra , Vasanth Tewar , Usha Kosalkar ,
                                                                                       5
                                                               4
                                    Shubhra Chinchmalapure , Prof. Anupam Chaube
                                           1,2,5 Department of Science and Technology,
                                               4 Department of Computer Science,
                         1,2,4,5 G H Raisoni College of Engineering and Management, Nagpur, Maharashtra, India
                  3 Department of Artificial Intelligence, G H Raisoni College of Engineering, Nagpur, Maharashtra, India

             ABSTRACT                                             SMS-based  OTP:  OTPs  sent  via  SMS  to  a  registered
             The increasing prevalence of online transactions and digital   phone number.
             banking  has  made  securing  sensitive  data  crucial.
                                                                  Email-based  OTP:  OTPs  sent  to  the  user’s  email
             Traditional authentication methods such as usernames and
             passwords are vulnerable to various types of cyber threats,   address.
             including  phishing,  man-in-the-middle  attacks,  and     App-based  OTP:  OTPs  generated  using  dedicated
             credential theft. This paper explores the use of One-Time   mobile apps like Google Authenticator or Authy.
             Password (OTP) mechanisms as a vital layer in enhancing
                                                                3.  Mechanisms of OTP Generation and Validation
             transaction security. It provides a thorough analysis of OTP
                                                                3.1.  OTP Generation Process
             generation,  transmission,  and  validation  techniques,
                                                                The generation of OTPs relies on cryptographic algorithms
             highlights  advantages,  challenges,  and  proposes  best
                                                                such as HMAC (Hashed Message Authentication  Code) or
             practices  for  integrating  OTP  in  modern  transaction
                                                                algorithms like SHA-1 or SHA-256. For example, in TOTP, the
             systems.  The  study  also  considers  the  future  of  OTP
                                                                OTP is generated using the current time (often in intervals)
             technology  and  its  evolving  role  in  multi-factor
                                                                combined with a shared secret key.
             authentication strategies.

                                                                3.2.  OTP Validation Process
             1.  INTRODUCTION                                   Once an OTP is generated, the user enters the OTP within a
             1.1.  Background                                   specific time window. The system compares the entered OTP
             As digital transactions continue to grow, they have become   with the generated OTP on the server-side, and if they match,
             an increasingly attractive target for cybercriminals. One of   access is granted. In the case of TOTP, the time-based factor
             the major vulnerabilities in digital systems is the reliance on   makes  the  OTP  only  valid  for  a  short  period,  enhancing
             static  authentication  methods  like  passwords.  These   security.
             methods are often insufficient for protecting sensitive data   4.  Advantages of OTP in Transaction Security
             and user accounts. One-Time Password (OTP) mechanisms   4.1.  Increased Security
             offer  a  solution  by  providing  dynamic  and  temporary   By  requiring  an  OTP  for  each  transaction,  it  significantly
             credentials,  making  it  harder  for  attackers  to  gain
                                                                reduces the risk of unauthorized access even if an attacker
             unauthorized access.
                                                                obtains the user's password. Since OTPs are short-lived, they
             1.2.  Objective                                    have a limited window of exploitation.
             This paper aims to provide a comprehensive review of OTP   4.2.  Prevention of Replay Attacks
             mechanisms  used  to  enhance  the  security  of  online   OTP ensures that each password is unique and valid only
             transactions.  We  will  analyze  different  OTP  technologies,   once.  This  mechanism  prevents  attackers  from  reusing
             their advantages, limitations, and explore a holistic approach   intercepted credentials to gain unauthorized access.
             to securing transactions using OTPs.
                                                                4.3.  Multi-Factor Authentication (MFA)
             2.  Overview of OTP Mechanisms
                                                                OTP is commonly used as part of a two-factor authentication
             2.1.  What is an OTP?
                                                                (2FA)  or  multi-factor  authentication  (MFA)  system.
             An OTP is a password that is valid for only one session or   Combining  OTP  with  something  a  user  knows  (e.g.,  a
             transaction. The primary goal of an OTP is to eliminate the   password) and something they have (e.g., an OTP sent to
             vulnerabilities  associated  with  static  passwords,  such  as   their  phone)  makes  it  much  harder  for  attackers  to
             replay attacks and credential theft. OTPs are typically short-  compromise the system.
             lived and require no reuse, making them inherently more
             secure.                                            5.  Challenges and Limitations of OTP Systems
                                                                5.1.  Vulnerabilities in SMS-based OTP
             2.2.  Types of OTP Mechanisms
                                                                  SIM  Swapping:  Attackers  can  hijack  a  user’s  phone
               Time-based OTP (TOTP): OTPs generated based on the
                                                                   number to intercept OTPs.
                current time and a shared secret key.
                                                                  Phishing:  Users  may  fall  victim  to  phishing  schemes
               Counter-based OTP (HOTP): OTPs generated using a   where  attackers  impersonate  legitimate  services  and
                counter that increments with each request.
                                                                   steal OTPs.
             IJTSRD | Special Issue on Emerging Trends and Innovations in Web-Based Applications and Technologies   Page 629
   634   635   636   637   638   639   640   641   642   643   644