SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and
                   Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.1141-1144
   Three Factor Authentication Schemes for the Automation of
  Inter-Networked banking and Teller Machine operations using
           Universal Subscriber Identification Modules
                             Sivasankar Bandaru*, Swapna. S**
                  *( M .Tech (WT), Aurora’s Technological and Research Institute, JNTUH
                             Hyderabad, Andhra Pradesh, pin code-500035, India)
            ** (Assistant professor, IT Department, Aurora’s Technological and Research Institute,
                        JNTUH Hyderabad, Andhra Pradesh, pin code-500035, India)


ABSTRACT
         Automated teller machines (ATMs) are             encryption algorithm was a simulation of the M-209
well known devices typically used by individuals          cipher machine used by the U.S.
to carry out a variety of personal and business           It has long been known that all a cracker need do to
financial transactions and/or banking functions.          acquire access to a Unix machine is to follow two
ATMs have become very popular with the                    simple steps, namely:
general public for their availability and general         1) Acquire a copy of that site’s /etc/passwd file,
user friendliness. ATMs are now found in many             either through an unprotected uucp link, well known
locations having a regular or high volume of              holes in sendmail, or via ftp or tftp
consumer traffic. Various services and resources          2) Apply the standard (or a sped-up) version of the
need protection from unauthorized use. Remote             password encryption algorithm to a collection of
authentication is the most commonly used                  words, typically /usr/dict/words plus some
method to determine the identity of a remote              permutations on account and user names and
client. This paper investigates a systematic              compare the encrypted results to those found in the
approach for authenticating clients by three              purloined /etc/passwd file.[3]
factors, namely password, smart card, and                 A SIM card contains a unique serial number it reads
biometrics. Biometrics is the identification of           the international mobile subscriber identity (IMSI),
humans by their characteristics or traits. A              security authentication and ciphering information,
physiological biometric would identify by one's           temporary information related to the local network, a
voice, Face, hand print or behaviour. Since               list of the services that the user has to access the
biometric identifiers are unique to individuals,          two passwords: a personal identification number
they are more reliable in verifying identity than         (PIN) for ordinary use and a personal unblocking
token and knowledge-based methods.                        code (PUK) for PIN unlocking.

Keywords— User authentication, Smart card, Face                     Cryptographers have traditionally analysed
Recognition and security                                  the security of ciphers by modelling cryptographic
                                                          algorithms as ideal mathematical objects. A modern
                                                          cipher is conventionally modelled as a black box that
I. INTRODUCTION                                           accepts plaintext inputs and provides cipher text
         In a traditional password authentication         outputs. Inside this box, the algorithm maps the
scheme, a system server has to be able to                 inputs to the outputs using a predefined function that
authenticate a remote logon based on identity and         depends on the value of a secret key. The black box
password. [2] Password authentication protocols           is described mathematically and formal analysis is
have two entities that share a password for the basis     used to examine the system's security. In a modern
of authentication. Password authentication can be         cipher, an algorithm's security rests solely on the
categorized into two types: weak-password                 concealment of the secret key.[4] Smart cards serves
authentication schemes and strong-password                ATM cards and mobile phone SIMs, authorization
authentication       schemes.       strong-password       cards to provide high-security identification and
authentication protocols have the advantages over         access-control cards, Smart cards can be used as
the weak-password authentication schemes in that          electronic wallets. The smart card chip can be
their computational overhead are lighter, designs are     "loaded" with funds to pay parking meters and
simpler, and the implementation are easier in the         vending machines. These Cryptographic protocols
computational environments.                               protect the exchange of money between the smart
         The security of accounts and passwords has       card and the accepting machines.
always been a concern for the developers and users        .
of Unix. When Unix was younger, the password




                                                                                               1141 | P a g e
Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and
                   Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.1141-1144
II. FUNCTIONALITY OF SMART CARD                   3-Factor-Login-Auth: This is another interactive
          Smart cards themselves usually are a small      protocol between the client C and the server S; this
part of a much more complex system. There are             enables the client to login successfully using PW,
usually complex networks of card terminals                SC, and BioData. An execution of this protocol is
connecting to other backend host computers that           denoted by
process the information from transactions occurring
at the card terminals. Companies investing in this
infrastructure have a vested interest in standardizing
the system components to guarantee the longevity of
the     system.    Without     standards,     different
manufacturers¢ components would not interoperate.
                                                                    The output of this protocol is “1” (if the
The smart card systems would not be generally
                                                          authentication is successful) or “0” (otherwise).
accepted because users would be forced to carry
                                                          3-Factor-Password-Changing: This protocol enables
around many different, non-interoperable smart
                                                          a client to change his/her password after a successful
cards. This is an untenable situation for both users
                                                          authentication. The data in the smart card will be
and manufacturers. [5]
                                                          updated accordingly
          Smart cards provide computing and
business systems the enormous benefit of portable
                                                          3-Factor-Biometrics-Changing2: An analogue of
and secure storage of data and value. At the same
                                                          password- changing is biometrics-changing, namely
time, the integration of smart cards into your system
                                                          the client can change his/her biometrics used in the
introduces its own security management issues, as
                                                          authentication, e.g., using a different finger or using
people access card data far and wide in a variety of
                                                          iris instead of finger. While biometrics-changing is
applications.
                                                          not supported by previous three-factor authentication
          In a PKI system a Digital Signature verifies
                                                          protocols, we believe it provides the client with
data at its origination by producing an identity that
                                                          more flexibility in the authentication. [1]
can be mutually verified by all parties involved in
the transaction. A cryptographic hash algorithm
produces a Digital Signature.                             III. PRINCIPAL OF COMPONENT ANALYSIS
                                                               (PCA) [6]:
A. It ensure data privacy, by encrypting data                       Principal component analysis (PCA) creates
B. It ensures data integrity, by recognizing if data      new variables that consist of uncorrelated, linear
has been manipulated in an unauthorized way               combinations of the original variables. PCA is used
C. Ensures data uniqueness by checking that data is       to simplify the data structure PCA also known as
"original", and not a "copy" of the "original". The       Karhunen Loeve projection. PCA calculates the
sender attaches a unique identifier to the "original"     Eigen vectors of the covariance matrix, and projects
data. This unique identifier is then checked by the       the original data onto a lower dimensional feature
receiver of the data.                                     space, which is defined by Eigen vectors with large
                                                          Eigen values. PCA has been used in face
         Smart Card based Protocol provides three-        representation and recognition where the Eigen
factor authentication protocol involves a client C and    vectors calculated are referred to as Eigen faces. In
a server S, and consists of five phases.                  gel images, even more than in human faces, the
3-Factor-Initialization: S generates two system           dimensionality of the original data is vast compared
parameters PK and SK. PK is published in the              to the size of the dataset, suggesting PCA as a useful
system, and SK is kept secret by S. An execution of       first step in analysis. There are many approaches to
this algorithm is denoted by 3-Factor-Initialization      face recognition ranging from the Principal
(k)  (PK, SK), where K is system’s security              Component Analysis (PCA) approach (also known
parameter.                                                as Eigen faces). Prediction through feature matching.
                                                          The idea of feature selection and point matching has
3-Factor-Reg: A client C, with an initial password        been used to track human motion. Eigen faces have
PW and biometric characteristics BioData, registers       been used to track human faces. They use a principal
on the system by running this interactive protocol        component analysis approach to store a set of known
with the server S. The output of this protocol is a       patterns in a compact subspace representation of the
smart card SC, which is given to C. An execution of       image space, where the subspace is spanned by the
this protocol is denoted by                               Eigen vectors of the training image set. It is one of
                                                          the more successful techniques of face recognition
                                                          and easy to understand and describe using
                                                          mathematics. This method involves using Eigen
                                                          faces [6]




                                                                                                1142 | P a g e
Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 3, Issue 1, January -February 2013, pp.1141-1144
IV. FACE RECOGNITION [7]:
          The ability to recognize people by their
facial characteristics Computers can conduct facial
database searches and/or perform live, one-to-one or
one-to-many verifications with unprecedented
accuracy and split-second processing. Users can be
granted secure access to their computer, mobile
devices, or for online e-commerce, simply by
looking into their Web camera.
The following details that can be shown
 Security
      - Military applications
  Personal information access
        -ATM                                            Fig: 3 it shows the administration details
        -Home access
Improved human machine interaction
          Many face verification applications make it
mandatory to acquire images with the same camera.
However, some applications, particularly those used
in law enforcement, allow image acquisition with
many camera types. This variation has the potential
to affect algorithm performance as severely as
changing illumination. But, unlike the effects of
changing illumination, the effects on performance of
using multiple camera types have not been
quantified. [7]

V. FIGURES                                              Fig:4 User Registration Form




Fig: 1   It shows the Bank Details


                                                        Fig:5 Capturing the image




Fig: 2 it shows the types of Bank




                                                        Fig:6 User Enter the PIN Details




                                                                                              1143 | P a g e
Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and
                     Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                      Vol. 3, Issue 1, January -February 2013, pp.1141-1144
                                                                  Security,”     Proc.    Second   USENIX
                                                                  Workshop Security, 1990.
                                                            [4]   T.S. Messerges, E.A. Dabbish, and R.H.
                                                                  Sloan, “Examining Smart-Card Security
                                                                  under the Threat of Power Analysis
                                                                  Attacks,” IEEE Trans. Computers, vol. 51,
                                                                  no. 5, pp. 541-552, May 2002.
                                                            [5]   Jorge Ferrari, Robert Mackinon, Sasan Poh
                                                                  and Lakshman Yathwara.” Smart card:
                                                                  Case Study” International Technical
                                                                  support Organization, October 1998.
                                                            [6]   Srinivasulu Asadi, Dr.Ch.D.V.Subba Rao
                                                                  and V.Saikrishna “A Comparative study of
Fig:7 Transaction Details                                         Face      Recognition     with    Principal
                                                                  Component Analysis and Cross-Correlation
VI. CONCLUSION:                                                   Technique” International Journal of
        ALL THE FUNCTIONS OF THE ATM, THE                         Computer Applications (0975 – 8887)
AUTHORS    ARE    NOW    CONCENTRATING   ON                       Volume 10– No.8, November 2010.
DEVELOPING THE INTENTION RECOGNITION, MOBILE                [7]   P. J. Phillips, A. Martin C. L. Wilson and
BASED PROCESSING AND ALERT MODULE.
                                                                  M. Przybocki, “An Introduction to
          This paper presents a novel architecture that           Evaluating Biometric Systems,” IEEE
can be used as a means of interaction between                     Computer, Vol.33, No.2, Feb. 2000, pp. 56-
mobile phone, ATM machine and a Banking                           63.
application for the purpose of withdrawing cash. The
proposed design; the secure M-cash withdrawal
allows the use of mobile phones as a tool of              Authors Profile:
interaction and provide flexibility through a robust
identity management architecture. The first part of
the architecture is the process of being implemented
and all the process involved has been analysed and
justified where possible.

VII.     ACKNOWLEDGMENT                                                  Sivasankar Bandaru is pursuing M.
         I would like to thanks some great mind           Tech in Web Technologies from Aurora’s
without whom this research would have been                Technological and Research Institute, JNTUH, A.P,
adistant reality. I am totally by the side of these       INDIA. His research areas include Distributed
people. I would like to say thanks to my parents who      System, and Computer networks.
support to me carry out my research without any
hindrance. My deepest thanks to great person, my
mentor Asst Prof. Swapna. S without whose ideas it
was impossible.

REFERENCES
  [1]    Xinyi Huang, Yang Xiang, Member, IEEE,                              S. Swapna received her M.Sc.
         Ashley Chonka, Jianying Zhou, and Robert         Computer Science in 2007 from Reddy women’s
         H. Deng, Senior Member, IEEE “A Generic          College Narayanguda and M. Tech in Web
         Framework            for        Three-Factor     Technologies from Aurora’s Technological and
         Authentication: Preserving Security and          Research Institute, JNTUH, A.P, INDIA. Her area of
         Privacy in Distributed Systems” IEEE             expertise includes Operating system, Web Security
         TRANSACTIONS ON PARALLEL AND                     and Database and Management System (DBMS),
         DISTRIBUTED SYSTEMS, VOL. 22, NO.                image processing. She is working as Assistant
         8, AUGUST 2011.                                  Professor in department of Information Technology
  [2]    C.H. Lin and Y.Y. Lai, “A Flexible               at Aurora’s Technological and Research Institute,
         Biometrics Remote User Authentication            Hyderabad.
         Scheme,” Computer Standards Interfaces,
         vol. 27, no. 1, pp. 19-23, Nov. 2004.
  [3]    D.V. Klein, “Foiling the Cracker: A Survey
         of, and Improvements to, Password




                                                                                             1144 | P a g e

Más contenido relacionado

La actualidad más candente

Digital Signature
Digital SignatureDigital Signature
Digital Signature
Rahul Yadav
 
Cardholder authentication for the piv dig sig key nist ir-7863
Cardholder authentication for the piv dig sig key nist ir-7863Cardholder authentication for the piv dig sig key nist ir-7863
Cardholder authentication for the piv dig sig key nist ir-7863
RepentSinner
 
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORKCOMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
ijesajournal
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
IOSR Journals
 

La actualidad más candente (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Card
 
Cardholder authentication for the piv dig sig key nist ir-7863
Cardholder authentication for the piv dig sig key nist ir-7863Cardholder authentication for the piv dig sig key nist ir-7863
Cardholder authentication for the piv dig sig key nist ir-7863
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORKCOMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
 
Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...Enhancing Security of Multimodal Biometric Authentication System by Implement...
Enhancing Security of Multimodal Biometric Authentication System by Implement...
 
Smart Card Security; Technology and Adoption
Smart Card Security; Technology and AdoptionSmart Card Security; Technology and Adoption
Smart Card Security; Technology and Adoption
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Finger print
Finger printFinger print
Finger print
 
4gfxs
4gfxs4gfxs
4gfxs
 
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private InformationA Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
Pki for dummies
Pki for dummiesPki for dummies
Pki for dummies
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 

Destacado

Exercicios gestao de estoque I
Exercicios gestao de estoque IExercicios gestao de estoque I
Exercicios gestao de estoque I
Janaina Fidalgo
 
Paru dans Swiss_Business_Mag_mars 2016_BD
Paru dans Swiss_Business_Mag_mars 2016_BDParu dans Swiss_Business_Mag_mars 2016_BD
Paru dans Swiss_Business_Mag_mars 2016_BD
Regine Vanheems
 
F08 9122-014 guia ambientes de formación
F08 9122-014 guia ambientes de formaciónF08 9122-014 guia ambientes de formación
F08 9122-014 guia ambientes de formación
Deivis Beltran Ospino
 
Programas De Formacion 2011
Programas De Formacion 2011Programas De Formacion 2011
Programas De Formacion 2011
indaianasan
 
Feria inernacional de arte arco 14
Feria inernacional de arte arco 14Feria inernacional de arte arco 14
Feria inernacional de arte arco 14
indaianasan
 
Suavizador industrial2472-duplex-marriot
Suavizador industrial2472-duplex-marriotSuavizador industrial2472-duplex-marriot
Suavizador industrial2472-duplex-marriot
suavizadores1
 

Destacado (20)

Fl3110851089
Fl3110851089Fl3110851089
Fl3110851089
 
Mv2522052211
Mv2522052211Mv2522052211
Mv2522052211
 
Mr2521772184
Mr2521772184Mr2521772184
Mr2521772184
 
Ek31903907
Ek31903907Ek31903907
Ek31903907
 
Eu31969985
Eu31969985Eu31969985
Eu31969985
 
Exercicios gestao de estoque I
Exercicios gestao de estoque IExercicios gestao de estoque I
Exercicios gestao de estoque I
 
Mapa conceptual blogspot 1
Mapa conceptual blogspot 1Mapa conceptual blogspot 1
Mapa conceptual blogspot 1
 
Sistema operativo computacion
Sistema operativo computacionSistema operativo computacion
Sistema operativo computacion
 
Notas plan hidrológico guadalquivir
Notas plan hidrológico guadalquivirNotas plan hidrológico guadalquivir
Notas plan hidrológico guadalquivir
 
Paru dans Swiss_Business_Mag_mars 2016_BD
Paru dans Swiss_Business_Mag_mars 2016_BDParu dans Swiss_Business_Mag_mars 2016_BD
Paru dans Swiss_Business_Mag_mars 2016_BD
 
Ju
JuJu
Ju
 
Trabalho de filosofia
Trabalho de filosofiaTrabalho de filosofia
Trabalho de filosofia
 
F08 9122-014 guia ambientes de formación
F08 9122-014 guia ambientes de formaciónF08 9122-014 guia ambientes de formación
F08 9122-014 guia ambientes de formación
 
Programas De Formacion 2011
Programas De Formacion 2011Programas De Formacion 2011
Programas De Formacion 2011
 
Daniel1
Daniel1Daniel1
Daniel1
 
Feria inernacional de arte arco 14
Feria inernacional de arte arco 14Feria inernacional de arte arco 14
Feria inernacional de arte arco 14
 
Convenio de Albufeira y DMA, por Juan Antonio Pavón
Convenio de Albufeira y DMA, por Juan Antonio Pavón Convenio de Albufeira y DMA, por Juan Antonio Pavón
Convenio de Albufeira y DMA, por Juan Antonio Pavón
 
Suavizador industrial2472-duplex-marriot
Suavizador industrial2472-duplex-marriotSuavizador industrial2472-duplex-marriot
Suavizador industrial2472-duplex-marriot
 
Jornadas Guadalquivir_Síntesis13mayo
Jornadas Guadalquivir_Síntesis13mayoJornadas Guadalquivir_Síntesis13mayo
Jornadas Guadalquivir_Síntesis13mayo
 
Domingo dia 15 maio 2011
Domingo dia 15 maio 2011Domingo dia 15 maio 2011
Domingo dia 15 maio 2011
 

Similar a Fu3111411144

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
Sarath K
 
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
eSAT Journals
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
Editor IJARCET
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
Editor IJARCET
 

Similar a Fu3111411144 (20)

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Biometric authentication reiew
Biometric authentication reiewBiometric authentication reiew
Biometric authentication reiew
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
 
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
 
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 

Fu3111411144

  • 1. Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1141-1144 Three Factor Authentication Schemes for the Automation of Inter-Networked banking and Teller Machine operations using Universal Subscriber Identification Modules Sivasankar Bandaru*, Swapna. S** *( M .Tech (WT), Aurora’s Technological and Research Institute, JNTUH Hyderabad, Andhra Pradesh, pin code-500035, India) ** (Assistant professor, IT Department, Aurora’s Technological and Research Institute, JNTUH Hyderabad, Andhra Pradesh, pin code-500035, India) ABSTRACT Automated teller machines (ATMs) are encryption algorithm was a simulation of the M-209 well known devices typically used by individuals cipher machine used by the U.S. to carry out a variety of personal and business It has long been known that all a cracker need do to financial transactions and/or banking functions. acquire access to a Unix machine is to follow two ATMs have become very popular with the simple steps, namely: general public for their availability and general 1) Acquire a copy of that site’s /etc/passwd file, user friendliness. ATMs are now found in many either through an unprotected uucp link, well known locations having a regular or high volume of holes in sendmail, or via ftp or tftp consumer traffic. Various services and resources 2) Apply the standard (or a sped-up) version of the need protection from unauthorized use. Remote password encryption algorithm to a collection of authentication is the most commonly used words, typically /usr/dict/words plus some method to determine the identity of a remote permutations on account and user names and client. This paper investigates a systematic compare the encrypted results to those found in the approach for authenticating clients by three purloined /etc/passwd file.[3] factors, namely password, smart card, and A SIM card contains a unique serial number it reads biometrics. Biometrics is the identification of the international mobile subscriber identity (IMSI), humans by their characteristics or traits. A security authentication and ciphering information, physiological biometric would identify by one's temporary information related to the local network, a voice, Face, hand print or behaviour. Since list of the services that the user has to access the biometric identifiers are unique to individuals, two passwords: a personal identification number they are more reliable in verifying identity than (PIN) for ordinary use and a personal unblocking token and knowledge-based methods. code (PUK) for PIN unlocking. Keywords— User authentication, Smart card, Face Cryptographers have traditionally analysed Recognition and security the security of ciphers by modelling cryptographic algorithms as ideal mathematical objects. A modern cipher is conventionally modelled as a black box that I. INTRODUCTION accepts plaintext inputs and provides cipher text In a traditional password authentication outputs. Inside this box, the algorithm maps the scheme, a system server has to be able to inputs to the outputs using a predefined function that authenticate a remote logon based on identity and depends on the value of a secret key. The black box password. [2] Password authentication protocols is described mathematically and formal analysis is have two entities that share a password for the basis used to examine the system's security. In a modern of authentication. Password authentication can be cipher, an algorithm's security rests solely on the categorized into two types: weak-password concealment of the secret key.[4] Smart cards serves authentication schemes and strong-password ATM cards and mobile phone SIMs, authorization authentication schemes. strong-password cards to provide high-security identification and authentication protocols have the advantages over access-control cards, Smart cards can be used as the weak-password authentication schemes in that electronic wallets. The smart card chip can be their computational overhead are lighter, designs are "loaded" with funds to pay parking meters and simpler, and the implementation are easier in the vending machines. These Cryptographic protocols computational environments. protect the exchange of money between the smart The security of accounts and passwords has card and the accepting machines. always been a concern for the developers and users . of Unix. When Unix was younger, the password 1141 | P a g e
  • 2. Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1141-1144 II. FUNCTIONALITY OF SMART CARD 3-Factor-Login-Auth: This is another interactive Smart cards themselves usually are a small protocol between the client C and the server S; this part of a much more complex system. There are enables the client to login successfully using PW, usually complex networks of card terminals SC, and BioData. An execution of this protocol is connecting to other backend host computers that denoted by process the information from transactions occurring at the card terminals. Companies investing in this infrastructure have a vested interest in standardizing the system components to guarantee the longevity of the system. Without standards, different manufacturers¢ components would not interoperate. The output of this protocol is “1” (if the The smart card systems would not be generally authentication is successful) or “0” (otherwise). accepted because users would be forced to carry 3-Factor-Password-Changing: This protocol enables around many different, non-interoperable smart a client to change his/her password after a successful cards. This is an untenable situation for both users authentication. The data in the smart card will be and manufacturers. [5] updated accordingly Smart cards provide computing and business systems the enormous benefit of portable 3-Factor-Biometrics-Changing2: An analogue of and secure storage of data and value. At the same password- changing is biometrics-changing, namely time, the integration of smart cards into your system the client can change his/her biometrics used in the introduces its own security management issues, as authentication, e.g., using a different finger or using people access card data far and wide in a variety of iris instead of finger. While biometrics-changing is applications. not supported by previous three-factor authentication In a PKI system a Digital Signature verifies protocols, we believe it provides the client with data at its origination by producing an identity that more flexibility in the authentication. [1] can be mutually verified by all parties involved in the transaction. A cryptographic hash algorithm produces a Digital Signature. III. PRINCIPAL OF COMPONENT ANALYSIS (PCA) [6]: A. It ensure data privacy, by encrypting data Principal component analysis (PCA) creates B. It ensures data integrity, by recognizing if data new variables that consist of uncorrelated, linear has been manipulated in an unauthorized way combinations of the original variables. PCA is used C. Ensures data uniqueness by checking that data is to simplify the data structure PCA also known as "original", and not a "copy" of the "original". The Karhunen Loeve projection. PCA calculates the sender attaches a unique identifier to the "original" Eigen vectors of the covariance matrix, and projects data. This unique identifier is then checked by the the original data onto a lower dimensional feature receiver of the data. space, which is defined by Eigen vectors with large Eigen values. PCA has been used in face Smart Card based Protocol provides three- representation and recognition where the Eigen factor authentication protocol involves a client C and vectors calculated are referred to as Eigen faces. In a server S, and consists of five phases. gel images, even more than in human faces, the 3-Factor-Initialization: S generates two system dimensionality of the original data is vast compared parameters PK and SK. PK is published in the to the size of the dataset, suggesting PCA as a useful system, and SK is kept secret by S. An execution of first step in analysis. There are many approaches to this algorithm is denoted by 3-Factor-Initialization face recognition ranging from the Principal (k)  (PK, SK), where K is system’s security Component Analysis (PCA) approach (also known parameter. as Eigen faces). Prediction through feature matching. The idea of feature selection and point matching has 3-Factor-Reg: A client C, with an initial password been used to track human motion. Eigen faces have PW and biometric characteristics BioData, registers been used to track human faces. They use a principal on the system by running this interactive protocol component analysis approach to store a set of known with the server S. The output of this protocol is a patterns in a compact subspace representation of the smart card SC, which is given to C. An execution of image space, where the subspace is spanned by the this protocol is denoted by Eigen vectors of the training image set. It is one of the more successful techniques of face recognition and easy to understand and describe using mathematics. This method involves using Eigen faces [6] 1142 | P a g e
  • 3. Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1141-1144 IV. FACE RECOGNITION [7]: The ability to recognize people by their facial characteristics Computers can conduct facial database searches and/or perform live, one-to-one or one-to-many verifications with unprecedented accuracy and split-second processing. Users can be granted secure access to their computer, mobile devices, or for online e-commerce, simply by looking into their Web camera. The following details that can be shown Security - Military applications Personal information access -ATM Fig: 3 it shows the administration details -Home access Improved human machine interaction Many face verification applications make it mandatory to acquire images with the same camera. However, some applications, particularly those used in law enforcement, allow image acquisition with many camera types. This variation has the potential to affect algorithm performance as severely as changing illumination. But, unlike the effects of changing illumination, the effects on performance of using multiple camera types have not been quantified. [7] V. FIGURES Fig:4 User Registration Form Fig: 1 It shows the Bank Details Fig:5 Capturing the image Fig: 2 it shows the types of Bank Fig:6 User Enter the PIN Details 1143 | P a g e
  • 4. Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1141-1144 Security,” Proc. Second USENIX Workshop Security, 1990. [4] T.S. Messerges, E.A. Dabbish, and R.H. Sloan, “Examining Smart-Card Security under the Threat of Power Analysis Attacks,” IEEE Trans. Computers, vol. 51, no. 5, pp. 541-552, May 2002. [5] Jorge Ferrari, Robert Mackinon, Sasan Poh and Lakshman Yathwara.” Smart card: Case Study” International Technical support Organization, October 1998. [6] Srinivasulu Asadi, Dr.Ch.D.V.Subba Rao and V.Saikrishna “A Comparative study of Fig:7 Transaction Details Face Recognition with Principal Component Analysis and Cross-Correlation VI. CONCLUSION: Technique” International Journal of ALL THE FUNCTIONS OF THE ATM, THE Computer Applications (0975 – 8887) AUTHORS ARE NOW CONCENTRATING ON Volume 10– No.8, November 2010. DEVELOPING THE INTENTION RECOGNITION, MOBILE [7] P. J. Phillips, A. Martin C. L. Wilson and BASED PROCESSING AND ALERT MODULE. M. Przybocki, “An Introduction to This paper presents a novel architecture that Evaluating Biometric Systems,” IEEE can be used as a means of interaction between Computer, Vol.33, No.2, Feb. 2000, pp. 56- mobile phone, ATM machine and a Banking 63. application for the purpose of withdrawing cash. The proposed design; the secure M-cash withdrawal allows the use of mobile phones as a tool of Authors Profile: interaction and provide flexibility through a robust identity management architecture. The first part of the architecture is the process of being implemented and all the process involved has been analysed and justified where possible. VII. ACKNOWLEDGMENT Sivasankar Bandaru is pursuing M. I would like to thanks some great mind Tech in Web Technologies from Aurora’s without whom this research would have been Technological and Research Institute, JNTUH, A.P, adistant reality. I am totally by the side of these INDIA. His research areas include Distributed people. I would like to say thanks to my parents who System, and Computer networks. support to me carry out my research without any hindrance. My deepest thanks to great person, my mentor Asst Prof. Swapna. S without whose ideas it was impossible. REFERENCES [1] Xinyi Huang, Yang Xiang, Member, IEEE, S. Swapna received her M.Sc. Ashley Chonka, Jianying Zhou, and Robert Computer Science in 2007 from Reddy women’s H. Deng, Senior Member, IEEE “A Generic College Narayanguda and M. Tech in Web Framework for Three-Factor Technologies from Aurora’s Technological and Authentication: Preserving Security and Research Institute, JNTUH, A.P, INDIA. Her area of Privacy in Distributed Systems” IEEE expertise includes Operating system, Web Security TRANSACTIONS ON PARALLEL AND and Database and Management System (DBMS), DISTRIBUTED SYSTEMS, VOL. 22, NO. image processing. She is working as Assistant 8, AUGUST 2011. Professor in department of Information Technology [2] C.H. Lin and Y.Y. Lai, “A Flexible at Aurora’s Technological and Research Institute, Biometrics Remote User Authentication Hyderabad. Scheme,” Computer Standards Interfaces, vol. 27, no. 1, pp. 19-23, Nov. 2004. [3] D.V. Klein, “Foiling the Cracker: A Survey of, and Improvements to, Password 1144 | P a g e