©Multilayered authentication for ATM transaction using keystroke dynamics and touch dynamics

被引:0
|
作者
Vaishnav, Pragya [1 ]
Raja, Linesh [1 ]
Singh, Poonam [1 ]
Vairavasamy, Ramakrishnan [2 ]
机构
[1] Manipal Univ Jaipur, Dept Comp Applicat, Jaipur, Rajasthan, India
[2] Tata Consultancy Serv, Amsterdam, Netherlands
关键词
PIN; Authentication; Security; Verification; ATM; Multilayer; Keystroke dynamics; Touch dynamics; KEY DISTRIBUTION PROTOCOL;
D O I
10.47974/JDMSC-1989
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Genuine person recognition systems are necessary for a system to identify or authorize the identification of a person requesting their services. Ensuring that only authorized users access the provided services is the aim of this proposed system. These systems are susceptible to impersonation attacks in the absence of strong personal recognition methods. Due to its traditional authentication technique (PIN), the ATM has suffered greatly over the years from PIN theft and other related ATM thefts. Therefore, in this paper, we proposed a multilayer (Typing and Touch) based authentication security arrangement to enhance the security and safety for the ATM and its users. The proposed system demonstrates a three-layered design structure. The first layer is the card verification module, which concentrates on the enrolment phase for ATM card. The second layer is the feature extraction and comparing of the typing pattern from the database server. The last layer compares the touch behavior continue till session end with the stored touch data in the database server. During the implementation phase, MySQL server 2010 served as the backend and Java was used for front-end development on Microsoft Windows 10. Based on the False Rejection Rate (FAR), False Acceptance Rate (FAR), and Equal Error Rate (EER) measurements, the application was evaluated. These metrics demonstrate the security and dependability of the suggested system for the authentication and verification of ATM customers.
引用
收藏
页码:1357 / 1365
页数:9
相关论文
共 50 条
  • [1] Continuous User Authentication using Keystroke Dynamics for Touch Devices
    Herath, H. M. C. K. B.
    Dulanga, K. G. C.
    Tharindu, N. V. D.
    Ganegoda, G. U.
    2022 2ND INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND ROBOTICS (ICIPROB), 2022,
  • [2] Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices
    Salem, Asma
    Zaidan, Dema
    Swidan, Andraws
    Saifan, Ramzi
    2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 15 - 21
  • [3] Analysis of Authentication System Based on Keystroke Dynamics
    Daribay, Amanzhol
    Obaidat, Mohammad S.
    Krishna, P. Venkata
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 226 - 231
  • [4] Online User Authentication System Using Keystroke Dynamics
    Salem, Asma
    Jabri, Ahmad Sharieh Riad
    JOURNAL OF COMPUTER SECURITY, 2023, 31 (03) : 185 - 215
  • [5] Multi-Model authentication using keystroke dynamics for Smartphones
    Cilia, Darren
    Inguanez, Frankie
    2018 IEEE 8TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - BERLIN (ICCE-BERLIN), 2018,
  • [6] Keystroke Dynamics Support for Authentication
    Patel, Mayank Sachan Sardar
    Joshi, Padmaja
    Patel, Nataasha Raul Sardar
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 186 - 191
  • [7] An authentication system using keystroke dynamics
    Zareen, Farhana Javed
    Matta, Chirag
    Arora, Akshay
    Singh, Sarmod
    Jabin, Suraiya
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2018, 10 (01) : 65 - 76
  • [8] Biometric Authentication Using Keystroke Dynamics
    Jadhav, Chandralekha
    Kulkarni, Siddhi
    Shelar, Sagar
    Shinde, Kaustubh
    Dharwadkar, Nagaraj V.
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 870 - 875
  • [9] Mobile Authentication using Keystroke Dynamics
    Dhage, Sudhir
    Kundra, Pranav
    Kanchan, Anish
    Kap, Pratiksha
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATION, INFORMATION & COMPUTING TECHNOLOGY (ICCICT), 2015,
  • [10] Unconstrained keystroke dynamics authentication with shared secret
    Giot, Romain
    El-Abed, Mohamad
    Hemery, Baptiste
    Rosenberger, Christophe
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 427 - 445