Secure Banking System Using Multi – Factor Authentication
Revathy Menon1 , Ajisha John2 , Sini Jacob3 , Sneha Divakaran4 , Diana Davis5
Section:Research Paper, Product Type: Journal Paper
Volume-2 ,
Issue-12 , Page no. 34-37, Dec-2014
Online published on Dec 31, 2014
Copyright © Revathy Menon, Ajisha John, Sini Jacob, Sneha Divakaran , Diana Davis . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Revathy Menon, Ajisha John, Sini Jacob, Sneha Divakaran , Diana Davis, “Secure Banking System Using Multi – Factor Authentication,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.34-37, 2014.
MLA Style Citation: Revathy Menon, Ajisha John, Sini Jacob, Sneha Divakaran , Diana Davis "Secure Banking System Using Multi – Factor Authentication." International Journal of Computer Sciences and Engineering 2.12 (2014): 34-37.
APA Style Citation: Revathy Menon, Ajisha John, Sini Jacob, Sneha Divakaran , Diana Davis, (2014). Secure Banking System Using Multi – Factor Authentication. International Journal of Computer Sciences and Engineering, 2(12), 34-37.
BibTex Style Citation:
@article{Menon_2014,
author = {Revathy Menon, Ajisha John, Sini Jacob, Sneha Divakaran , Diana Davis},
title = {Secure Banking System Using Multi – Factor Authentication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2014},
volume = {2},
Issue = {12},
month = {12},
year = {2014},
issn = {2347-2693},
pages = {34-37},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=327},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=327
TI - Secure Banking System Using Multi – Factor Authentication
T2 - International Journal of Computer Sciences and Engineering
AU - Revathy Menon, Ajisha John, Sini Jacob, Sneha Divakaran , Diana Davis
PY - 2014
DA - 2014/12/31
PB - IJCSE, Indore, INDIA
SP - 34-37
IS - 12
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3795 | 3578 downloads | 3651 downloads |
Abstract
Remote authentication is the most commonly used method to determine the identity of a remote client. Secure and efficient authentication scheme has been a very important issue with the development of networking technologies. In a Generic framework for Authentication, preserving security and privacy in distributed systems provide three factors for authentication of clients. This paper investigates a systematic approach for authenticating clients by five factors, namely RFID card, PIN, biometrics, One Time Password (OTP) and keypad ID. The conversion not only significantly improves the information assurance at low cost but also protects client privacy in distributed systems.
Key-Words / Index Term
Authentication, Distributed Systems, Security, Privacy, PIN, RFID card, Biometrics
References
[1] Xinyi Huang, Yang Xiang, Jianying Zhou and Robert H. Deng, “A Generic framework for three factor authentication: Preserving security and privacy in distributed systems” IEEE Trans. Parallel and distributed system Vol. 22, no. 8, pp. 1390-1397, August 2011.
[2] C.-I. Fan and Y.-H. Lin,“Provably Secure Remote Truly Three- Factor Authentication Scheme with Privacy Protection on Bio- metrics,” IEEE Trans. Information Forensics and Security, vol. 4, no. 4, pp. 933-945, Dec. 2009.
[3] C.H. Lin and Y.Y. Lai, “A Flexible Biometrics Remote User Authentication Scheme,” Computer Standards Interfaces, vol. 27, no. 1, pp. 19-23, Nov. 2004.
[4] M.K. Khan and J. Zhang, “Improving the Security of A Flexible Biometrics Remote User Authentication Scheme‟,” Computer Standards Interfaces, vol. 29, no. 1, pp. 82- 85, Jan.2007.
[5] H. Tian, X. Chen, and Y. Ding, “Analysis of Two Types Deniable Authentication Protocols,” Int‟l J. Network Security, vol. 9, no. 3, pp. 242-246, July 2009.
[6] C.T. Li and M.-S. Hwang, “An Efficient Biometrics-Based Remote User Authentication Scheme Using Smart Cards,”J. Network and Computer Applications, vol.33, no. 1, pp. 1-5, 2010.
[7] M.Scott, “Cryptanalysis of an ID-Based Password Authentication Scheme Using Smart Cards and Fingerprints,” ACM SIGOPS Operating Systems Rev., vol. 38,no. 2, pp. 73- 75, Apr. 2004.