Secure Banking System Using Multi – Factor Authentication
Keywords:
Authentication, Distributed Systems, Security, Privacy, PIN, RFID card, BiometricsAbstract
Remote authentication is the most commonly used method to determine the identity of a remote client. Secure and efficient authentication scheme has been a very important issue with the development of networking technologies. In a Generic framework for Authentication, preserving security and privacy in distributed systems provide three factors for authentication of clients. This paper investigates a systematic approach for authenticating clients by five factors, namely RFID card, PIN, biometrics, One Time Password (OTP) and keypad ID. The conversion not only significantly improves the information assurance at low cost but also protects client privacy in distributed systems.
References
Xinyi Huang, Yang Xiang, Jianying Zhou and Robert H. Deng, “A Generic framework for three factor authentication: Preserving security and privacy in distributed systems” IEEE Trans. Parallel and distributed system Vol. 22, no. 8, pp. 1390-1397, August 2011.
C.-I. Fan and Y.-H. Lin,“Provably Secure Remote Truly Three- Factor Authentication Scheme with Privacy Protection on Bio- metrics,” IEEE Trans. Information Forensics and Security, vol. 4, no. 4, pp. 933-945, Dec. 2009.
C.H. Lin and Y.Y. Lai, “A Flexible Biometrics Remote User Authentication Scheme,” Computer Standards Interfaces, vol. 27, no. 1, pp. 19-23, Nov. 2004.
M.K. Khan and J. Zhang, “Improving the Security of A Flexible Biometrics Remote User Authentication Scheme‟,” Computer Standards Interfaces, vol. 29, no. 1, pp. 82- 85, Jan.2007.
H. Tian, X. Chen, and Y. Ding, “Analysis of Two Types Deniable Authentication Protocols,” Int‟l J. Network Security, vol. 9, no. 3, pp. 242-246, July 2009.
C.T. Li and M.-S. Hwang, “An Efficient Biometrics-Based Remote User Authentication Scheme Using Smart Cards,”J. Network and Computer Applications, vol.33, no. 1, pp. 1-5, 2010.
M.Scott, “Cryptanalysis of an ID-Based Password Authentication Scheme Using Smart Cards and Fingerprints,” ACM SIGOPS Operating Systems Rev., vol. 38,no. 2, pp. 73- 75, Apr. 2004.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
