Using Multifactor Authentication for Secure Mobile Transaction

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2015 by IJCOT Journal
Volume - 5 Issue - 4
Year of Publication : 2015
Authors :  P. G. V. Suresh Kumar
DOI : 10.14445/22492593/IJCOT-V22P304

Citation

P. G. V. Suresh Kumar"Using Multifactor Authentication for Secure Mobile Transaction", International Journal of Computer & organization Trends (IJCOT), V5(4):16-19 Jul - Aug 2015, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract Mobile device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile devices provide various services fulfill almost all the user requirements as an effective communication and information delivering services. So there is a demand to communicate or exchange confidential information in a secure environment. In this paper, we introduce a security enhancement based multifactor authentication for secure mobile transaction that compromises cost, simplicity, security and performance of transaction. This proposal presents a biometrics authentication system as face recognition technology, a Public Key Infrastructure (PKI) such as an X.509 certificate both are used in the mobile device which help the mobile transaction.

References

[1] Special Issue on Automated Biometric Systems, Proc. of the IEEE, Vol. 85, No. 9 (1997).
[2] A. Jain et al., eds.: BIOMETRICS Personal Identification in Networked Society, Kluwer Academic Publishers (1999).
[3] ECOM (The Electronic Commerce Promotion Council of Japan) Personal Authentication Technology Study WG: Standards for Evaluation of Personal Authentication (First Ed.), ECOM Report, H9- WG06, http: //www. ecom. or. jp/about wg/wg06/h9doc/wg06-list.htm (1998).
[4] W. Ford, et al: Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, Prentice Hall (1997).
[5] C. Ellison and B. Schneier, Ten risks of PKI, Computer security journal, Vol. 16, No. 1 (2000).

Keywords
Public Key Infrastructure (PKI), Biometric, X.509 certificate, mobile device.