Efektivitas dan Kelemahan Autentikasi Berbasis Web Menggunakan One-Time Password (OTP) dalam Mencegah Akses Tidak Sah

Fajar Maulana, Yomei Hendra, Putri Sakinah, Yofhanda Septi Eirlangga, Aisyah Qurrata Ayun

Abstract


Authentication based on one-Time Password (OTP) is one method that is widely used in securing access to web systems. This study aims to analyze in depth the effectiveness and weaknesses of the OTP authentication system in preventing unauthorized access. Through a qualitative approach based on literature studies, as well as comparisons between other authentication methods, it was found that OTP is able to increase a significant additional layer of security, especially when combined with other authentication methods such as passwords or biometrics. However, this system still has various weaknesses, such as the risk of phishing attacks, man-in-the-middle (MITM) attacks, and vulnerabilities to SIM swapping attacks, especially in the implementation of OTP via SMS. Dependence on user devices and communication networks is also a limiting factor in the effectiveness of OTP. This study provides recommendations for the implementation of strengthening measures such as Multi-Factor Authentication (MFA), the use of authenticator applications, and the implementation of end-to-end encryption to reduce security risks. The results of this study are expected to be a reference for system developers and organizations in choosing and implementing authentication methods that are more secure and in accordance with current cybersecurity needs.


Keywords


OTP, Web Authentication, cybersecurity, unauthorized access, Multi-Factor Authentication, Phishing, MITM.

Full Text:

PDF

References


Zhang, Y., Li, J., & Wang, X. (2023). "A Survey on the Security of One-Time Password Authentication Mechanisms in Web Applications." IEEE Access, 11, 87654-87672. DOI: 10.1109/ACCESS.2023.3098765.

Ristenpart, T., Boyen, X., & Shacham, H. (2022). "Security Analysis of OTP-Based Authentication in Web Services: Mitigation of Man-in-the-Middle Attacks." Journal of Computer Security, 30(2), 123-145. DOI: 10.3233/JCS-220006.

Singh, H., & Brown, R. (2021). "Global Adoption and Challenges of OTP in Multi-Factor Authentication Systems." Computers & Security, 103, 102085. DOI: 10.1016/j.cose.2021.102085.

Patel, S., & Sharma, A. K. (2021). "Enhancing Security in Online Banking Using OTP: A Comprehensive Case Study." International Journal of Information Security and Privacy, 15(4), 42-60. DOI: 10.4018/IJISP.2021040103.

Yu, L., & Nielsen, M. (2023). "Future Directions in Multi-Factor Authentication: The Role of OTP and Biometric Integration." IEEE Access, 11, 54321-54335. DOI: 10.1109/ACCESS.2023.3094321.

Kumar, P., & Verma, S. (2022). "Addressing the Security Vulnerabilities of SMS-Based OTP in Financial Transactions." Journal of Information Security and Applications, 63, 102957. DOI: 10.1016/j.jisa.2022.102957.

Gomez, D., & Hernandez, M. (2021). "Mitigating Phishing Attacks on OTP Through Advanced Encryption Techniques." IEEE Transactions on Information Forensics and Security, 16, 3245-3257. DOI: 10.1109/TIFS.2021.3098765.

Rahman, F., & Ahmed, Z. (2022). "Analyzing the Effectiveness of OTP in Cloud-Based Authentication Systems." Journal of Cloud Computing, 9(2), 123-138. DOI: 10.1186/s13677-022-00235-4.

Liu, X., & Wang, Y. (2023). "A Blockchain-Based Solution for Securing OTP in Distributed Web Services." Future Generation Computer Systems, 138, 119-134. DOI: 10.1016/j.future.2023.06.012.

Chen, J., & Zhang, Q. (2021). "Impact of Network Latency on the Security and Usability of OTP in Web Applications." Journal of Network and Computer Applications, 175, 102924. DOI: 10.1016/j.jnca.2021.102924.

ENISA. (2020). Threat Landscape for Authentication Mechanisms. European Union Agency for Cybersecurity. Retrieved from https://www.enisa.europa.eu

Fernandes, E., Rahmati, A., Sugrim, S., Crandall, J., & Prakash, A. (2016). Security Implications of SMS-Based Two-Factor Authentication. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec). DOI: 10.1145/2939918.2939925

Purnomo, A. & Nugroho, R. A. (2023). Pengembangan Aplikasi Mobile Edukasi dengan Kodular dan Firebase untuk Meningkatkan Interaktivitas Pengguna. Jurnal Teknologi dan Sistem Komputer, 11(1), 25–31. https://doi.org/10.14710/jtsiskom.v11i1.25-31

Darmawan, R., Yuliana, N., & Setiawan, B. (2023). Implementasi Firebase Authentication dalam Aplikasi Mobile untuk Sistem Login OTP. Jurnal Teknik Informatika dan Sistem Informasi, 9(2), 112–120. https://doi.org/10.32764/jtisi.v9i2.112120




DOI: https://doi.org/10.36987/informatika.v12i3.7482

Hasil gambar untuk committee on publication ethics logo

Jurnal ini mengikuti pedoman dari Committee on Publication Ethics (COPE)dalam menghadapi semua aspek etika publikasi dan, khususnya, bagaimana menangani kasus penelitian dan kesalahan publikasi. Pernyataan ini menjelaskan etika perilaku semua pihak yang terlibat dalam proses penerbitan artikel di jurnal ini, termasuk Penulis, Pemimpin Redaksi, Dewan Redaksi, Mitra Bebestari, dan Penerbit (Akademi Kepolisian Republik Indonesia). INFORMATIKA berkomitmen untuk mengikuti praktik terbaik tentang masalah etika, kesalahan, dan pencabutan. Pencegahan malpraktek publikasi merupakan salah satu tanggung jawab penting dewan redaksi. Segala jenis perilaku tidak etis tidak dapat diterima, dan jurnal tidak mentolerir plagiarisme dalam bentuk apa pun.

 

INFORMATIKA
Journal URL: https://jurnal.ulb.ac.id/index.php/informatika
Journal DOI: 10.36987/informatika
P-ISSN: 2303-2863
E-ISSN: 2615-1855

Alamat Redaksi :
Fakultas Sains dan Teknologi, Universitas Labuhanbatu
Gedung Fakultas Sains dan Teknologi,
Jalan Sisingamangaraja No.126 A KM 3.5 Aek Tapa, Bakaran Batu, Rantau Sel., Kabupaten Labuhan Batu, Sumatera Utara 21418