Browse > Article
http://dx.doi.org/10.9708/jksci.2015.20.1.143

A Framework of User Authentication for Financial Transaction based Multi-Biometrics in Mobile Environments  

Han, Seung-Jin (Dept. of e-Business, KyungIn Women's College)
Abstract
Biometric technology has been proposed as a new means to replace conventional PIN or password because it is hard to be lost and has the low possibility of illegal use. However, unlike a PIN, password, and personal information there is no way to modify the exposure if it is exposed and used illegally. Therefore, the existing single modality with single biometrics is critical when it expose. However in this paper, we use a multi-modality and multi-biometrics to authenticate between users and TTP or between users and financial institutions. Thereby, we propose a more reliable method and compared this paper with existed methods about security and performance in this paper.
Keywords
Biometrics; Multi-Modality; Multi-Biometrics; Password; Mobile Device; TTP; Financial Institution; Financial Transaction;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Jian Wang, Nan Jiang, "Secure Authentication and Authorization Scheme for Mobile Devices," Proceedings of ICCTA2009, 2009.
2 Woonho Jung, "A Trends of Mobile payments and alternative authentication certificate," http://www.t-town.co.kr:8080/images/Event/2014tech/5_tmonet_mobilepay.pdf, LG CNS, 14th, May, 2014.
3 Seungjin Han, A Financial Security using Mobile Biometrics Application and Technology, Technical Report, KISA, March, 2014.
4 Seungjin Han, "A Framework for Biometric Security based on OTP in Mobile Devices," Journal of The Korea Society of Computer and Information, Vol. 17, No. 4, pp. 121-127, Apr. 2012.   과학기술학회마을   DOI   ScienceOn
5 M. Gordon and S. Sankaeanaeayanan, "Biometric Security Mechanism in Mobile Payments", Proc., of the 5th National Conference; INDIACom-2011, Computing For Nation Development, March 10-11, 2011.
6 Bao, X, Wang, J. and Hu, J, "Method of Individual Identification based on Electroencephalogram Analysis", Proc., of 2009 International Conference on New Trends in Information and Service Science, pp. 390-393, Beijing, P.R.China, June 9-July 2, 2009.
7 Nakanishi, I, Baba, S and Miyamoto, C, "EEG Based Biometric Authentication Using New Spectral Features", Proc., of 2009 International Symposium on Intelligent Signal Processing and Communication Systems, pp. 651-654, Kanazawa, Ishikawa, Japan, December 7-9, 2009.
8 http://www.huffingtonpost.com/2011/10/19/face-unlock-ice-cream-sandwich_n_1020207.html
9 Daugman, J, "How Iris Recognition Works", IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, Jan., 2004.   DOI   ScienceOn
10 ITU-T, "A Guideline to Technical and Operational Countermeasures for Telebiometric Applications using Mobile Devices," Comm. 3rd Draft Recommendation ITU-T X.1087(X.tam)
11 Namho, Kim, A Study on the Mobile OTP Key Creation Method using Biometrics Information, Doctoral dissertation, Computer science and Statistics of Chonnam Univ., Feb., 2013.
12 Lin You, et. al., "Signature Systems on Smart Card with Keys Generated by Fingerprint," pp. 675-679, ICACT2006, Feb. 20-22, 2006.
13 Chin-Ling Chen, Jinn-Ke Jan, and Chih-Feng Chien, "Using Mobile Device to Design A Secure Transaction," 2010 International Conference on Complex, Intelligent and Software Intensive Systems, IEEE, Krakow, 15-18 Feb. 2010.
14 Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer and Stephane Tinguely, "Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards", Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002.
15 W. Diffie and M. Hellman, "New Directions on Cryptography," IEEE Transactions on Information Theory, IT-22(6): pp. 644-654, Nov., 1976.
16 Y. Zheng, D. K. He, X. H. Tang and, H. X. Wang, "AKA and Authtentication Scheme for 4G Mobile Networks Based on Trusted Mobile Platform", ICICS 2005, pp. 976-980, 2005.
17 3GPP TS 24.002, Release 4. GSM-UMTS public land mobile network access reference configuration, June, 2003.