Abstract
The recent growth of digital transactions over the internet is high. This is the newest topic which is to be implemented as well as need to study related with the security. The development of technology we need to improve and build the safe authentication scheme over the internet. The safe authentication scheme is protecting the user valuable information against security threats. While performing digital transactions over the internet, the protection is turn into high importance and demand for authentication is more necessary than before. In the traditional authentication there are so many problems such as username, password & so on. Also, intruders will crack various ways of hacking user information, passwords including brute force attack, shoulder surfing, dictionary attacks, etc.
This paper is useful to performing a secure authentication scheme using different fusion techniques for digital transactions. The propose system approach here combines user details as like user name, password, OTP and biometrics (traits as like fingerprint, face & iris) fusion verification for a more valid user authentication. Our proposed point of view has been initiating to improve security benefits for various forms of invasion & authentication layers turn on password-based attacks.
Keywords
- Blockchain
- Data Verification
- Supply Chains
- Digital Manufacturing
- Digital Product Passport
- Smart Contracts
- Merkle Trees
- Zero-Knowledge Proofs
- Permissioned Networks
- Verifiable Credentials.
References
- V. Khattri and D. K. Singh, “Implementation of an Additional Factor for Secure Authentication in Online Transactions,” J. Organ. Comput. Electron. Commer., vol. 29, no. 4, pp. 258–273, 2019.
- Ometov, S. Bezzateev, N. Mäkitalo, S. Andreev, T. Mikkonen, and Y. Koucheryavy, “Multi-Factor Authentication: A Survey,” Cryptography, vol. 2, no. 1, p. 1, 2018.
- Mohammed and Yassin, “Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator’s Fingerprint and Smart Mobile Device,” Cryptography, vol. 3, no. 3, p. 24, 2019.
- Abhishek Arvind, Pradyumna Mahajan, and Rishikesh Chalke, “TOTP Based Authentication Using QR Code For Gateway Entry System,” Int. J. Eng. Comput. Sci., vol. 9, no. 05, pp. 25023–25028, 2020.
- J. Santos, M. Antunes, J. Mangana, D. Monteiro, P. Santos, and J. Casal, “Security testing framework for a novel mobile wallet ecosystem,” Proc. - 9th Int. Conf. Comput. Intell. Commun. Networks, CICN 2017, vol. 2018–Janua, pp. 153–160, 2018.
- E. Benli, I. Engin, C. Giousouf, M. A. Ulak, and S. Bahtiyar, “BioWallet: A Biometric Digital Wallet,” Twelfth Int. Conf. Syst. (Icons 2017), no. April 2017, pp. 38–41, 2017.
- D. S. Islamiati, D. Agata, and A. R. AnomBesari, “Design and Implementation of Various Payment System for Product Transaction in Mobile Application,” IES 2019 - Int. Electron. Symp. Role Techno-Intelligence Creat. an Open Energy Syst. Towar. Energy Democr. Proc., pp. 287–292, 2019.
- N. Abu Bakar, S. Rosbi, and K. Uzaki, “E-Wallet Transactional Framework for Digital Economy: A Perspective from Islamic Financial Engineering,” Int. J. Manag. Sci. Bus. Adm., vol. 6, no. 3, pp. 50–57, 2020.
- O. S. Okpara and G. Bekaroo, “Cam-Wallet: Fingerprint-based authentication in M-wallets using embedded cameras,” IEEE Int. Conf. Environ. Electr. Eng., 2017.
- O. Alsayed and A. L. Bilgrami, “E-Banking Security: Internet Hacking, , Analysis and Prevention of Fraudulent Activities,” Int. J. Emerg. Technol. Adv. Eng., vol. 7, no. 1, pp. 109–115, 2017.
- O. Ogbanufe and D. J. Kim, “Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment,” Decis. Support Syst., vol. 106, pp. 1–14, 2018.
- P. Aigbe and J. Akpojaro, “Analysis of Security Issues in Electronic Payment Systems,” Int. J. Comput. Appl., vol. 108, no. 10, pp. 10–14, 2014.E. Huseynov and J.-M. Seigneur, Context-Aware Multifactor Authentication Survey. Elsevier Inc., 2017.
- J. Gualdoni, A. Kurtz, I. Myzyri, M. Wheeler, and S. Rizvi, “Secure Online Transaction Algorithm: Securing Online Transaction Using Two-Factor
- Authentication,” Procedia Comput. Sci., vol. 114, pp. 93–99, 2017.C
- J. Gualdoni, A. Kurtz, I. Myzyri, M. Wheeler, and S. Rizvi, “Secure Online Transaction Algorithm: Securing Online Transaction Using Two-Factor Authentication,” Procedia Comput. Sci., vol. 114, pp. 93–99, 2017.B
- E. E. Nwabueze, I. Obioha, and O. Onuoha, “Enhancing Multi-Factor Authentication in Modern Computing,” Commun. Netw., vol. 09, no. 03, pp. 172–178, 2017M. Harish, R. Karthick, R. M. Rajan, and V. Vetriselvi, A New Approach to Securing Online Transactions—The Smart Wallet, vol. 500, no. January. Springer Singapore, 2019.
- Rancha and P. Singh, “Issues and Challenges of Electronic Payment Systems,” Int. J. Res. Manag. Pharmacy (IJRMP), vol. 2, no. 9, pp. 25–30, 2013.1
- R. Mohan and N. Partheeban, “Secure Multimodal Mobile Authentication Using One Time Password,” Int. J. Recent Technol. Eng., vol. 1, no. 1, pp. 131–136, 2014.2
- Mohammed and Yassin, “Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator’s Fingerprint and Smart Mobile Device,” Cryptography, vol. 3, no. 3, p. 24, 2019.V. Shukla, A. Chaturvedi, and N. Srivastava, “A new one-time password mechanism for client-server applications,” J. Discret. Math. Sci. Cryptogr., vol. 22, no. 8, pp. 1393–1406, 2019.5
- K. A. Taher, T. Nahar, and S. A. Hossain, “Enhanced cryptocurrency security by time-based token multi-factor authentication algorithm,” 1st Int. Conf. Robot. Electr. Signal Process. Tech. ICREST 2019, pp. 308–312, 2019.C. A. Soare, “Internet Banking Two-Factor Authentication using Smartphones,” J. Mobile, Embed. Distrib. Syst., vol. 4, no. 1, pp. 12–18, 2012.
- Hassan, Z. Shukur, and M. K. Hasan, “An Improved Time-Based One Time Password Authentication Framework for Electronic Payments,” Int. J. Adv. Comput. Sci. Appl., vol. 11, no. 11, pp. 359–366, 2020.
- S. F. Tan and A. Samsudin, “Enhanced Security of Internet Banking Authentication with EXtended Honey Encryption (XHE) Scheme,” pp. 201–216, 2018.
- N. Yildirim and A. Varol, “A research on security vulnerabilities in online and mobile banking systems,” 7th Int. Symp. Digit. Forensics Secur. ISDFS 2019, pp. 1–5, 2019.
- M. Harish, R. Karthick, R. M. Rajan, and V. Vetriselvi, A New Approach to Securing Online Transactions—The Smart Wallet, vol. 500, no. January. Springer Singapore, 2019.