Research Article

Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications

Table 1

Assessment of the proposed protocol model with existing OpenID model.

OpenID Methods Login any
PC/Laptop
(Any/Own)
Security
(Safe/ Unsafe)
PriceTrust

Preventing Session Hijacking [26]Any (Verisign labs Personal Identity Portal used for the experiment)Partially Safe (Double Authentication)FreeMedium

Anti-phishing OpenID Solution [1]AnyPartially Safe (Double 
Authentication)
FreeMedium

BEAMAUTH Anti-phishing solution [44]Own 
(vanilla web browser)
Partially Safe 
(Double 
Authentication)
Low-costLow

OpenID Authentication Model using Trusted Computing [35]AnyPartially safe Low-costHigh

OpenID security weakness analyzed via OWASP tools [30]Own 
(web browser)
Not very much SecureFreeLow

Anti-phishing OpenID Page token solution [13]Own 
(google console developers and salesforec.com)
Partially secureLow-costMedium

Proposed DAAA ProtocolAnySafe
(Triple
Authentication)
FreeHigh

Bold observations provide best security features as compared to other OpenID methods.