Secure Banking System Using Multi – Factor Authentication

Authors

  • Menon R Department of Information Technology Jyothi Engineering College, Cheruthuruthy, Thrissur, Kerala, India
  • John A Department of Information Technology Jyothi Engineering College, Cheruthuruthy, Thrissur, Kerala, India
  • Jacob S Department of Information Technology Jyothi Engineering College, Cheruthuruthy, Thrissur, Kerala, India
  • Divakaran S Department of Information Technology Jyothi Engineering College, Cheruthuruthy, Thrissur, Kerala, India
  • Davis D Department of Information Technology Jyothi Engineering College, Cheruthuruthy, Thrissur, Kerala, India

Keywords:

Authentication, Distributed Systems, Security, Privacy, PIN, RFID card, Biometrics

Abstract

Remote authentication is the most commonly used method to determine the identity of a remote client. Secure and efficient authentication scheme has been a very important issue with the development of networking technologies. In a Generic framework for Authentication, preserving security and privacy in distributed systems provide three factors for authentication of clients. This paper investigates a systematic approach for authenticating clients by five factors, namely RFID card, PIN, biometrics, One Time Password (OTP) and keypad ID. The conversion not only significantly improves the information assurance at low cost but also protects client privacy in distributed systems.

References

Xinyi Huang, Yang Xiang, Jianying Zhou and Robert H. Deng, “A Generic framework for three factor authentication: Preserving security and privacy in distributed systems” IEEE Trans. Parallel and distributed system Vol. 22, no. 8, pp. 1390-1397, August 2011.

C.-I. Fan and Y.-H. Lin,“Provably Secure Remote Truly Three- Factor Authentication Scheme with Privacy Protection on Bio- metrics,” IEEE Trans. Information Forensics and Security, vol. 4, no. 4, pp. 933-945, Dec. 2009.

C.H. Lin and Y.Y. Lai, “A Flexible Biometrics Remote User Authentication Scheme,” Computer Standards Interfaces, vol. 27, no. 1, pp. 19-23, Nov. 2004.

M.K. Khan and J. Zhang, “Improving the Security of A Flexible Biometrics Remote User Authentication Scheme‟,” Computer Standards Interfaces, vol. 29, no. 1, pp. 82- 85, Jan.2007.

H. Tian, X. Chen, and Y. Ding, “Analysis of Two Types Deniable Authentication Protocols,” Int‟l J. Network Security, vol. 9, no. 3, pp. 242-246, July 2009.

C.T. Li and M.-S. Hwang, “An Efficient Biometrics-Based Remote User Authentication Scheme Using Smart Cards,”J. Network and Computer Applications, vol.33, no. 1, pp. 1-5, 2010.

M.Scott, “Cryptanalysis of an ID-Based Password Authentication Scheme Using Smart Cards and Fingerprints,” ACM SIGOPS Operating Systems Rev., vol. 38,no. 2, pp. 73- 75, Apr. 2004.

Downloads

Published

2014-12-31

How to Cite

[1]
R. Menon, A. John, S. Jacob, S. Divakaran, and D. Davis, “Secure Banking System Using Multi – Factor Authentication”, Int. J. Comp. Sci. Eng., vol. 2, no. 12, pp. 34–37, Dec. 2014.

Issue

Section

Research Article