©Multilayered authentication for ATM transaction using keystroke dynamics and touch dynamics

被引:0
|
作者
Vaishnav, Pragya [1 ]
Raja, Linesh [1 ]
Singh, Poonam [1 ]
Vairavasamy, Ramakrishnan [2 ]
机构
[1] Manipal Univ Jaipur, Dept Comp Applicat, Jaipur, Rajasthan, India
[2] Tata Consultancy Serv, Amsterdam, Netherlands
关键词
PIN; Authentication; Security; Verification; ATM; Multilayer; Keystroke dynamics; Touch dynamics; KEY DISTRIBUTION PROTOCOL;
D O I
10.47974/JDMSC-1989
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Genuine person recognition systems are necessary for a system to identify or authorize the identification of a person requesting their services. Ensuring that only authorized users access the provided services is the aim of this proposed system. These systems are susceptible to impersonation attacks in the absence of strong personal recognition methods. Due to its traditional authentication technique (PIN), the ATM has suffered greatly over the years from PIN theft and other related ATM thefts. Therefore, in this paper, we proposed a multilayer (Typing and Touch) based authentication security arrangement to enhance the security and safety for the ATM and its users. The proposed system demonstrates a three-layered design structure. The first layer is the card verification module, which concentrates on the enrolment phase for ATM card. The second layer is the feature extraction and comparing of the typing pattern from the database server. The last layer compares the touch behavior continue till session end with the stored touch data in the database server. During the implementation phase, MySQL server 2010 served as the backend and Java was used for front-end development on Microsoft Windows 10. Based on the False Rejection Rate (FAR), False Acceptance Rate (FAR), and Equal Error Rate (EER) measurements, the application was evaluated. These metrics demonstrate the security and dependability of the suggested system for the authentication and verification of ATM customers.
引用
收藏
页码:1357 / 1365
页数:9
相关论文
共 50 条
  • [31] A Keystroke Dynamics Based Approach for Continuous Authentication
    El Menshawy, Dina
    Mokhtar, Hoda M. O.
    Hegazy, Osman
    BEYOND DATABASES, ARCHITECTURES AND STRUCTURES, BDAS 2014, 2014, 424 : 415 - 424
  • [32] Authentication by Keystroke Dynamics: The Influence of Typing Language
    Altwaijry, Najwa
    APPLIED SCIENCES-BASEL, 2023, 13 (20):
  • [33] Behavioral Biometrics Scheme with Keystroke and Swipe Dynamics for User Authentication on Mobile Platform
    Tse, Ka-Wing
    Hung, Kevin
    2019 IEEE 9TH SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS (ISCAIE), 2019, : 125 - 130
  • [34] A novel approach for user authentication using keystroke dynamics
    Shekhawat, Kirty
    Bhatt, Devershi Pallavi
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07) : 2015 - 2027
  • [35] Biometric personal authentication using keystroke dynamics: A review
    Karnan, M.
    Akila, M.
    Krishnaraj, N.
    APPLIED SOFT COMPUTING, 2011, 11 (02) : 1565 - 1573
  • [36] Keystroke Dynamics based Authentication using Fuzzy Logic
    Yadav, Jatin
    Pandey, Kavita
    Gupta, Shashank
    Sharma, Richa
    2017 TENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2017, : 313 - 318
  • [37] Hybrid Method for Active Authentication using Keystroke Dynamics
    Kaganov, Vladislav
    Korolyov, Andrey
    Krylov, Mikhail
    Mashechkin, Igor
    Petrovskiy, Mikhail
    2014 14TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2014, : 61 - 66
  • [38] Keystroke Dynamics Authentication Using Neural Network Approaches
    Shanmugapriya, Venkateswaran
    Padmavathi, Ganapathi
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 686 - +
  • [39] Active Authentication Using Touch Dynamics
    Leingang, William
    Gunn, Dylan
    Kim, Jung Hee
    Yuan, Xiaohong
    Roy, Kaushik
    IEEE SOUTHEASTCON 2018, 2018,
  • [40] Sensing Pressure for Authentication System Using Keystroke Dynamics
    Nonaka, Hidetoshi
    Kurihara, Masahito
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 1, 2007, 1 : 16 - 19