z-logo
open-access-imgOpen Access
Design and Implementation of Cost Effective Multi-factor Authentication Framework for ATM Systems
Author(s) -
Nuku Atta Kordzo Abiew,
Maxwell Dorgbefu,
Samuel Osei Banning
Publication year - 2020
Publication title -
asian journal of research in computer science
Language(s) - English
Resource type - Journals
ISSN - 2581-8260
DOI - 10.9734/ajrcos/2020/v5i330135
Subject(s) - security token , authentication (law) , computer science , computer security , multi factor authentication , authentication protocol , chip authentication program , lightweight extensible authentication protocol , process (computing) , generic bootstrapping architecture , data authentication algorithm , operating system
Banks and financial institutions all over the world have adopted and continue to adopt Automated Teller Machine (ATM) systems into their transactions to extend banking hours, and also provide convenience for their customers. ATM systems are networked computerized systems, and as the case is in these systems, their security must be given the highest priority. Among the many strategies for ensuring secured networked systems, authentication is very important. Authentication is the process of verifying the identity of a user or a process that attempts to access information resources from a system. Good authentication methods and schemes are one of the best standard ways of implementing security on computerized systems. The importance of selecting an environment appropriate authentication method is perhaps the most crucial decision in designing secure systems. Authentication protocols are capable of simply authenticating the connecting party or authenticating the connecting party as well as authenticating itself to the connecting party. The verification process is usually based on authentication factors like facts, characteristics, behaviors, or knowledge known only to both the claimant and the verifier. Based on these authentication factors, authentication is classified into knowledge-based (KBA), token-based (TBA) and biometrics-based (BBA) authentications. In this paper, we designed and implemented a hybrid and secure cost-effective authentication framework for ATM systems based on the strengths of the three main authentication classifications.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here