E-Authentication for Secure Net Banking

Authors

  • Mitul Chauhan Computer Engineering, Dr. D. Y. Patil Institute of Technology, Savitribai Phule Pune University, Pimpri, Pune, India
  • Gayatri Barapatre Computer Engineering, Dr. D. Y. Patil Institute of Technology, Savitribai Phule Pune University, Pimpri, Pune, India
  • Amruta Ghatge Computer Engineering, Dr. D. Y. Patil Institute of Technology, Savitribai Phule Pune University, Pimpri, Pune, India
  • Rajashri Sabale Computer Engineering, Dr. D. Y. Patil Institute of Technology, Savitribai Phule Pune University, Pimpri, Pune, India
  • Pooja Sakunde Computer Engineering, Dr. D. Y. Patil Institute of Technology, Savitribai Phule Pune University, Pimpri, Pune, India

Keywords:

Online Banking Authentication (OBA), Linear Regression, Classification, Machine Learning

Abstract

Recent technological advances have resulted in a plethora of personal computing devices such as smartphones, tablets, watches, and eyewear, among others. This has helped them realize a digital world in which vital everyday tasks may be completed via the Internet from any location, at any time, and on any device. At the same time, improvements in pervasive computing technology have given birth to the notion of smart spaces, which aims to provide customized services to inhabitant in an automated manner. User authentication, or verifying a user`s identity, is critical in the digital world to safeguard personal data kept online (e.g., online bank accounts) and on personal devices (e.g., smart phones), as well as to enable tailored services in smart spaces (e.g., adjusting room temperature etc.). Traditional authentication methods (such as passwords or fingerprints) have recently been proved to be vulnerable to hacking. As a result, researchers have developed a slew of novel ways for authenticating users in the aforementioned scenarios. This study provides an overview of these unique systems in order to help guide future research in these areas.

 

References

SYED W. SHAH AND SALIL S. KANHERE, “Recent Trends in User Authentication – A Survey.” Institute of Electrical and Electronics Engineers (IEEE), Vol 7, Issue. , pp.112505 – 112519, 2019.

WENZHENG LIU, XIAOFENG WANG, WEIPENG, “State of the Art: Secure Mobile Payment.” Institute of Electrical and Electronics Engineers (IEEE), Vol 8, Issue. , pp. 13898 - 13914, 2020.

Anum Tanveer Kiyani, Aboubaker Lasebae, Kamran Ali1 and Masood Ur-Rehman “Secure Online Banking with Biometrics”. In the Proceedings of the 2019 International Conference on Advances in the Emerging Computing Technologies (AECT), pp. 1-6, 2020.

Divyans Mahansaria, Uttam Kumar Roy, “Secure Authentication for ATM transactions using NFC technology.” In the Proceedings of the 2019 International Carnahan Conference on Security Technology (ICCST), 2019.

Wen-Hui Lin, Bao-Hua Wu, Qian-Hua Huang, “A Face-Recognition Approach based on Secret Sharing for User Authentication in Public-Transportation Security.” In the Proceedings of the 2018 IEEE International Conference on Applied System Invention (ICASI), 2018.

N. Clarke and S. Furnell “Authentication of users on mobile telephones – A survey of attitudes and practices.” In the Proceedings of the 2018 IEEE International Conference on Applied System Invention (ICASI), 2018.

Andrew Bissada, Aspen Olmsted “Mobile Multi-Factor Authentication”, In the Proceedings of the 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017.

Kavitha K, Saravanan, “SURVIVAL STUDY ON DATA STORAGE AND TRANSACTION SECURITY USING AUTHENTICATION TECHNIQUES”, International Journal of Computer Sciences and Engineering (IJCSE), Vol-6, Issue-8, pp.34-39, 2018.

Anil Lamba, “A Survey of various machine learning techniques used in Intrusion Detection System”, International Journal of Computer Sciences and Engineering (IJCSE), Vol-7, Issue-5, pp.557-563, 2019.

Downloads

Published

2022-02-28

How to Cite

[1]
M. Chauhan, G. Barapatre, A. Ghatge, R. Sabale, and P. Sakunde, “E-Authentication for Secure Net Banking”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 10, no. 1, pp. 15–18, Feb. 2022.

Issue

Section

Survey Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.