©Multilayered authentication for ATM transaction using keystroke dynamics and touch dynamics

被引:0
|
作者
Vaishnav, Pragya [1 ]
Raja, Linesh [1 ]
Singh, Poonam [1 ]
Vairavasamy, Ramakrishnan [2 ]
机构
[1] Manipal Univ Jaipur, Dept Comp Applicat, Jaipur, Rajasthan, India
[2] Tata Consultancy Serv, Amsterdam, Netherlands
关键词
PIN; Authentication; Security; Verification; ATM; Multilayer; Keystroke dynamics; Touch dynamics; KEY DISTRIBUTION PROTOCOL;
D O I
10.47974/JDMSC-1989
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Genuine person recognition systems are necessary for a system to identify or authorize the identification of a person requesting their services. Ensuring that only authorized users access the provided services is the aim of this proposed system. These systems are susceptible to impersonation attacks in the absence of strong personal recognition methods. Due to its traditional authentication technique (PIN), the ATM has suffered greatly over the years from PIN theft and other related ATM thefts. Therefore, in this paper, we proposed a multilayer (Typing and Touch) based authentication security arrangement to enhance the security and safety for the ATM and its users. The proposed system demonstrates a three-layered design structure. The first layer is the card verification module, which concentrates on the enrolment phase for ATM card. The second layer is the feature extraction and comparing of the typing pattern from the database server. The last layer compares the touch behavior continue till session end with the stored touch data in the database server. During the implementation phase, MySQL server 2010 served as the backend and Java was used for front-end development on Microsoft Windows 10. Based on the False Rejection Rate (FAR), False Acceptance Rate (FAR), and Equal Error Rate (EER) measurements, the application was evaluated. These metrics demonstrate the security and dependability of the suggested system for the authentication and verification of ATM customers.
引用
收藏
页码:1357 / 1365
页数:9
相关论文
共 50 条
  • [21] A novel security scheme for behavioral authentication systems based on keystroke dynamics
    Salem, Asma
    Obaidat, Mohammad S.
    SECURITY AND PRIVACY, 2019, 2 (02):
  • [22] Keystroke Dynamics-Based Authentication Using Unique Keypad
    Choi, Maro
    Lee, Shincheol
    Jo, Minjae
    Shin, Ji Sun
    SENSORS, 2021, 21 (06)
  • [23] On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics
    Cockell, Robert
    Halak, Basel
    CRYPTOGRAPHY, 2020, 4 (02) : 1 - 14
  • [24] Free Typed Text Using Keystroke Dynamics for Continuous Authentication
    Pinto, Paulo
    Patrao, Bernardo
    Santos, Henrique
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 33 - 45
  • [25] Keystroke Dynamics for Continuous Authentication
    Ananya
    Singh, Saurabh
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 205 - 208
  • [26] Keystroke dynamics for authentication in smartphone
    Roh, Jong-hyuk
    Lee, Sung-Hun
    Kim, Soohyung
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 1155 - 1159
  • [27] Enhanced Authentication System Performance Based on Keystroke Dynamics using Classification algorithms
    Salem, Asma
    Sharieh, Ahmad
    Sleit, Azzam
    Jabri, Riad
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (08) : 4076 - 4092
  • [28] The Impact of Database Quality on Keystroke Dynamics Authentication
    Panasiuk, Piotr
    Rybnik, Mariusz
    Saeed, Khalid
    Rogowski, Marcin
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2015 (ICNAAM-2015), 2016, 1738
  • [29] Biometric Authentication and Identification using Keystroke Dynamics: A Survey
    Banerjee, Salil P.
    Woodard, Damon L.
    JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01): : 116 - 139
  • [30] A Comparison of Keystroke Dynamics Techniques for User Authentication
    Anusas-amornkul, Tanapat
    Wangsuk, Kasem
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 45 - 49