SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1821
THREE LAYERED SECURITY FOR BANKING
Tanvi Gangawane1, Jemin Patel2, Sambhav Thole3
1Tanvi Gangawane, Dept of Information and Technology, Atharva College Of Engineering, Maharashtra, India
2Jemin Patel, Dept of Information and Technology, Atharva College Of Engineering, Maharashtra, India
3Sambhav Thole, Dept of Information and Technology, Atharva College Of Engineering, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Layered Security is one method of security to
protect the user’s resources and data. one layered security
consists the usage of login creditionals like username and
password. It is the most commonly used system of
authentication but it comes with a number of security risks
such as stealing the secure and private information and
keylogging attack. To overcome this issue we have enhanced
the level of security by adding two more layers of security i.e
authentication using QR code and OTP based authentication.
Key Words: IMEI number, OTP, QR code, three layered
security.
1. INTRODUCTION
QR code is two dimensional matrix barcode whichstoresthe
data in that dimension. Data is presentedassquaredotswith
specific pattern in both horizontal as well as vertical
dimension. Specific QR scanner can read those patterns and
retrieves the stored data. In our approach, second layer is
Authentication using QR code. For this, smartphone is used
as QR scanner. Instead of executing the entireauthentication
process on personal computer, the part of authentication is
moved to the smartphone. This part of authentication
enhances security greatly and offers protection against
attack such as malware and keylogging attacks. User plays
his/her role in visual authentication which boosts both the
security of our system and reassuring to the user that they
plays role in the process of authentication. It is not degrade
the usability.
1.1 NEED
A keylogger is a software designed to capture all of a user’s
keyboard strokes, and then make use of themtoimpersonate
a user in financial transactions. keylogger attacks are
generally used in login procedures where username and
password can stole by user’s keyboard strokes or moves.so
there is need for authentication system which not only takes
username and password but also acquire for another
verification step. mostly user’s are insecure about their own
account in manydomainasbank,healthcare,institutes.sothe
secure and trustworthy authentication system is needed for
people or user.
1.2 APPLICATION AND SCOPE
Our protocols are generic and can be applied to many
domains in authentication system. For example, ATM
(Automated Teller Machine), personal computer.
Furthermore, our design doesnotrequirean explicitchannel
between the bank and the smartphone, which is desirable in
many domains.
SCOPE
Besides the security of an authentication protocol, both
usability and deploybility are equally important and critical
for the acceptance of any protocol in modern computing
settings. The authentication protocols which we used are
generic and can be applied to many types of authentication.
It gives better user experience.
2. LITERATURE SURVEY
QR i.e. "Quick Response" code is a 2D matrix code that is
designed by keeping two points under consideration, i.e. it
must store large amount of data as comparedto1Dbarcodes
and it must be decoded at high speed using any handheld
device like phones. QR code provides high data storage
capacity, fast scanning, omnidirectional readability, and
many other advantages including, error- correction (so that
damaged code can also be read successfully) and different
type of versions. Different varieties of QR code symbols like
logo QR code, encrypted QR code, iQR Code are also
available so that user can choose among them according to
their need. Now these days, a QR code is applied in different
application streams related to marketing, security,
academics etc. and gain popularity at a really high pace. Day
by day more people are getting aware of this technologyand
use it accordingly.[1]
An open source confirmationof-idea verification framework
that uses a two-figure authentication by joining a secret key
and a camera-prepared cell phone, going about as a
confirmation token. Advanced cell isutilizedfordecodingthe
QR code. The code is scan with the QR code scanner of cell
phone. IMEI number of a telephone which is enlist by the
client and the arbitrary number, where irregular number is
created by the arbitrary number capacity requirement.[2]
Presence system is one of the important components in the
lecture process and student attendance recap is one of the
elements in various aspects of lecture assessment. Presence
has been carried out by signing students. The use of
telecommunications technology which is now growing
rapidly is the smart phone where one of the operating
systems used in smart phones is the Android operating
system, Android provides an open platform for users to
create their own applications that have been used if various
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1822
mobile devices. In addition to the development of
communication technology, there is also a Quick Response
Code or QR Code that has the meaning of a code that can
convey information quickly with a quick response. QR Code
can not only store horizontal information such as barcodes
but can also store information vertically. This study aims to
build a presence system using an Android operating system.
[3]
3. PROPOSED SYSTEM FOR PROJECT
Fig -1: Proposed System
1. Terminal
A user’s terminal i.e desktop computer or laptop. The user
log in with username and password byusingterminal.When
server generates QR code, then the QR code displays on
terminal. OTP dialog box displays on terminal. OTP submits
to server by using terminal. on successful login the bank
account webpage opens on terminal.
2. Server
Server is the system entity which performs back-end
operations by interacting with theterminal.Servergenerates
QR code and sends to terminal. On successful QR visual login
server sends OTP to smartphone.server-sent-OTPsubmitsto
server from terminal. Sever checks for successful or
unsuccessful authentication.
3. Smartphone:
Smartphone scans QR code which is displayed on terminal.
On sucessful QR code visual login, smartphone receives OTP
from server.
4. METHODOLOGY
In our approach terminal, server and smartphone each has
important role. On terminal, user log in with username and
password. The login creditionals sends to server. Server
receives the creditionals and checks in database for
registered user. Once the user is found as registeredinonline
banking account, then server starts to fetch IMEI number
related to that particular user and encrypts it into QR code
using QR generator. IMEI number encrypted into QR code
using encryptionkey. NewformedQRcodesendstoterminal.
Where smartphone is camera equipped in it . the application
with QR scanner is in smartphone. Smartphone has IMEI
number same as registered user encrypted IMEI number.
That’s why smartphoneapplicationscannerdecryptspattern
hidden in QR code. QR code get scanned by smartphone i.e
Visual login of QR code.
Once QR codedecrypts, themessageofsuccessfulvisuallogin
sends to server. Server generates 3D OTP i.e three layered of
security. Server sends OTP to smartphone. Internet
connection should be moderate for procedure. User use this
OTP on terminal. On successful OTP verification, server will
give user access to his bank account web page.
4.1 ALGORITHM USED
Encrk(ꞏ): an encryption algorithm whichtakesa keyk anda
message M from set M and outputs a cipher-text C in the set
C.
Decrk(ꞏ): a decryption algorithmwhichtakesa ciphertextC
in C and a key k, and outputs a plain-text (or message) M in
the set M.
Sign(ꞏ): a signature generation algorithm which takes a
privatekey SK and a message M from the setM,andoutputsa
signature.
Verf(ꞏ): a signature verification algorithm which takes a
public key PK and a signed message (M, _), and returns valid
or invalid.
QREnc(ꞏ): a QR encoding algorithm whichtakesa stringS in
S and outputs a QR code
QRDec(ꞏ): a QR decoding algorithm which takes a QR code
and returns a string S in S.
RSA Algorithm: RSA is the algorithm used by modern
computers to encrypt and decrypt messages. This is also
called public key cryptography.
5. RESULT AND ANALYSIS
For User Login
Fig -2: User Login
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1823
Once the user completes registration process for bank
account the user can log in to his/her system withusername
and password anytime.
Fig -3: QR code generation
After successful user login, QR code will display on user’s
terminal. This QR code will get scanned by smartphone with
scanner in it.
5.1 COMPARATIVE ANALYSIS
Table-1: Comparative Analysis based on security
6. CONCLUSION
Our work provides extra security with thenormal methodof
on-line authentication of banking which incorporates
username and password. However, by adding QR code
authentication the safety measures for banking is secure. At
the end, with one time password authentication which
completes fulfilment for user login for his/herbank account.
REFERENCES
[1] Sumit Tiwari, “An Introduction To QRCodeTechnology,”
inInternational Conference onInformationTechnology,2016
[2] Chirag Patil, Umesh Naik, Pallavi Vartak, “Online Session
Security System using QR code,OTP and IMEI,” in Imperial
Journal of Interdisciplinary Research (IJIR) Vol-3, Issue-3,
2017
[9] Sonawane Shamal, Khandave Monika, Nemade Neha,
“Secure AuthenticationforOnlineBankingUsing QR Code,”in
International Journal of Emerging TechnologyandAdvanced
Engineering,2016

Contenu connexe

Tendances

Ieee+Hardware+List+2009
Ieee+Hardware+List+2009Ieee+Hardware+List+2009
Ieee+Hardware+List+2009
pavan
 

Tendances (20)

IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...IRJET- 	  Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card Payment
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
 
Security Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage DevicesSecurity Protocols for USB Mass Storage Devices
Security Protocols for USB Mass Storage Devices
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
 
Ieee+Hardware+List+2009
Ieee+Hardware+List+2009Ieee+Hardware+List+2009
Ieee+Hardware+List+2009
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using MicrocontrollerIRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using Microcontroller
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
 
000
000000
000
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
IOT based Industrial Automation using Raspberry Pi
IOT based Industrial Automation using  Raspberry PiIOT based Industrial Automation using  Raspberry Pi
IOT based Industrial Automation using Raspberry Pi
 

Similaire à IRJET - Three Layered Security for Banking

Similaire à IRJET - Three Layered Security for Banking (20)

IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET- Smart Trolley for Billing System
IRJET-   	  Smart Trolley for Billing SystemIRJET-   	  Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
IRJET- Toll Plaza Payment using QR Code
IRJET- Toll Plaza Payment using QR CodeIRJET- Toll Plaza Payment using QR Code
IRJET- Toll Plaza Payment using QR Code
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning CodeIRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
Review of Types and Analysis of Two Dimensional Bar Codes in Logistics and E-...
 
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano CompilerDesign and Analysis of Ignition based on RFID by Arduino Nano Compiler
Design and Analysis of Ignition based on RFID by Arduino Nano Compiler
 
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET-  	  A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR Code
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
 

Plus de IRJET Journal

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Dernier (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 

IRJET - Three Layered Security for Banking

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1821 THREE LAYERED SECURITY FOR BANKING Tanvi Gangawane1, Jemin Patel2, Sambhav Thole3 1Tanvi Gangawane, Dept of Information and Technology, Atharva College Of Engineering, Maharashtra, India 2Jemin Patel, Dept of Information and Technology, Atharva College Of Engineering, Maharashtra, India 3Sambhav Thole, Dept of Information and Technology, Atharva College Of Engineering, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Layered Security is one method of security to protect the user’s resources and data. one layered security consists the usage of login creditionals like username and password. It is the most commonly used system of authentication but it comes with a number of security risks such as stealing the secure and private information and keylogging attack. To overcome this issue we have enhanced the level of security by adding two more layers of security i.e authentication using QR code and OTP based authentication. Key Words: IMEI number, OTP, QR code, three layered security. 1. INTRODUCTION QR code is two dimensional matrix barcode whichstoresthe data in that dimension. Data is presentedassquaredotswith specific pattern in both horizontal as well as vertical dimension. Specific QR scanner can read those patterns and retrieves the stored data. In our approach, second layer is Authentication using QR code. For this, smartphone is used as QR scanner. Instead of executing the entireauthentication process on personal computer, the part of authentication is moved to the smartphone. This part of authentication enhances security greatly and offers protection against attack such as malware and keylogging attacks. User plays his/her role in visual authentication which boosts both the security of our system and reassuring to the user that they plays role in the process of authentication. It is not degrade the usability. 1.1 NEED A keylogger is a software designed to capture all of a user’s keyboard strokes, and then make use of themtoimpersonate a user in financial transactions. keylogger attacks are generally used in login procedures where username and password can stole by user’s keyboard strokes or moves.so there is need for authentication system which not only takes username and password but also acquire for another verification step. mostly user’s are insecure about their own account in manydomainasbank,healthcare,institutes.sothe secure and trustworthy authentication system is needed for people or user. 1.2 APPLICATION AND SCOPE Our protocols are generic and can be applied to many domains in authentication system. For example, ATM (Automated Teller Machine), personal computer. Furthermore, our design doesnotrequirean explicitchannel between the bank and the smartphone, which is desirable in many domains. SCOPE Besides the security of an authentication protocol, both usability and deploybility are equally important and critical for the acceptance of any protocol in modern computing settings. The authentication protocols which we used are generic and can be applied to many types of authentication. It gives better user experience. 2. LITERATURE SURVEY QR i.e. "Quick Response" code is a 2D matrix code that is designed by keeping two points under consideration, i.e. it must store large amount of data as comparedto1Dbarcodes and it must be decoded at high speed using any handheld device like phones. QR code provides high data storage capacity, fast scanning, omnidirectional readability, and many other advantages including, error- correction (so that damaged code can also be read successfully) and different type of versions. Different varieties of QR code symbols like logo QR code, encrypted QR code, iQR Code are also available so that user can choose among them according to their need. Now these days, a QR code is applied in different application streams related to marketing, security, academics etc. and gain popularity at a really high pace. Day by day more people are getting aware of this technologyand use it accordingly.[1] An open source confirmationof-idea verification framework that uses a two-figure authentication by joining a secret key and a camera-prepared cell phone, going about as a confirmation token. Advanced cell isutilizedfordecodingthe QR code. The code is scan with the QR code scanner of cell phone. IMEI number of a telephone which is enlist by the client and the arbitrary number, where irregular number is created by the arbitrary number capacity requirement.[2] Presence system is one of the important components in the lecture process and student attendance recap is one of the elements in various aspects of lecture assessment. Presence has been carried out by signing students. The use of telecommunications technology which is now growing rapidly is the smart phone where one of the operating systems used in smart phones is the Android operating system, Android provides an open platform for users to create their own applications that have been used if various
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1822 mobile devices. In addition to the development of communication technology, there is also a Quick Response Code or QR Code that has the meaning of a code that can convey information quickly with a quick response. QR Code can not only store horizontal information such as barcodes but can also store information vertically. This study aims to build a presence system using an Android operating system. [3] 3. PROPOSED SYSTEM FOR PROJECT Fig -1: Proposed System 1. Terminal A user’s terminal i.e desktop computer or laptop. The user log in with username and password byusingterminal.When server generates QR code, then the QR code displays on terminal. OTP dialog box displays on terminal. OTP submits to server by using terminal. on successful login the bank account webpage opens on terminal. 2. Server Server is the system entity which performs back-end operations by interacting with theterminal.Servergenerates QR code and sends to terminal. On successful QR visual login server sends OTP to smartphone.server-sent-OTPsubmitsto server from terminal. Sever checks for successful or unsuccessful authentication. 3. Smartphone: Smartphone scans QR code which is displayed on terminal. On sucessful QR code visual login, smartphone receives OTP from server. 4. METHODOLOGY In our approach terminal, server and smartphone each has important role. On terminal, user log in with username and password. The login creditionals sends to server. Server receives the creditionals and checks in database for registered user. Once the user is found as registeredinonline banking account, then server starts to fetch IMEI number related to that particular user and encrypts it into QR code using QR generator. IMEI number encrypted into QR code using encryptionkey. NewformedQRcodesendstoterminal. Where smartphone is camera equipped in it . the application with QR scanner is in smartphone. Smartphone has IMEI number same as registered user encrypted IMEI number. That’s why smartphoneapplicationscannerdecryptspattern hidden in QR code. QR code get scanned by smartphone i.e Visual login of QR code. Once QR codedecrypts, themessageofsuccessfulvisuallogin sends to server. Server generates 3D OTP i.e three layered of security. Server sends OTP to smartphone. Internet connection should be moderate for procedure. User use this OTP on terminal. On successful OTP verification, server will give user access to his bank account web page. 4.1 ALGORITHM USED Encrk(ꞏ): an encryption algorithm whichtakesa keyk anda message M from set M and outputs a cipher-text C in the set C. Decrk(ꞏ): a decryption algorithmwhichtakesa ciphertextC in C and a key k, and outputs a plain-text (or message) M in the set M. Sign(ꞏ): a signature generation algorithm which takes a privatekey SK and a message M from the setM,andoutputsa signature. Verf(ꞏ): a signature verification algorithm which takes a public key PK and a signed message (M, _), and returns valid or invalid. QREnc(ꞏ): a QR encoding algorithm whichtakesa stringS in S and outputs a QR code QRDec(ꞏ): a QR decoding algorithm which takes a QR code and returns a string S in S. RSA Algorithm: RSA is the algorithm used by modern computers to encrypt and decrypt messages. This is also called public key cryptography. 5. RESULT AND ANALYSIS For User Login Fig -2: User Login
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1823 Once the user completes registration process for bank account the user can log in to his/her system withusername and password anytime. Fig -3: QR code generation After successful user login, QR code will display on user’s terminal. This QR code will get scanned by smartphone with scanner in it. 5.1 COMPARATIVE ANALYSIS Table-1: Comparative Analysis based on security 6. CONCLUSION Our work provides extra security with thenormal methodof on-line authentication of banking which incorporates username and password. However, by adding QR code authentication the safety measures for banking is secure. At the end, with one time password authentication which completes fulfilment for user login for his/herbank account. REFERENCES [1] Sumit Tiwari, “An Introduction To QRCodeTechnology,” inInternational Conference onInformationTechnology,2016 [2] Chirag Patil, Umesh Naik, Pallavi Vartak, “Online Session Security System using QR code,OTP and IMEI,” in Imperial Journal of Interdisciplinary Research (IJIR) Vol-3, Issue-3, 2017 [9] Sonawane Shamal, Khandave Monika, Nemade Neha, “Secure AuthenticationforOnlineBankingUsing QR Code,”in International Journal of Emerging TechnologyandAdvanced Engineering,2016