The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network (VPN) backbone. This prominent application of VPN evades the hurdles involved in physical money exchange. The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server. The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014, Capital One Data Breach in 2019, and many more cloud server attacks over and over again. These attacks necessitate the demand for a strong framework for authentication to secure from any class of threat. This research paper, propose a framework with a base of Elliptical Curve Cryptography (ECC) to perform secure financial transactions through Virtual Private Network (VPN) by implementing strong Multi-Factor Authentication (MFA) using authentication credentials and biometric identity. The research results prove that the proposed model is to be an ideal scheme for real-time implementation. The security analysis reports that the proposed model exhibits high level of security with a minimal response time of 12 s on an average of 1000 users.
In this digital world, there are many applications to secure and legalize their data and all of these emissions by various techniques and there are many algorithms and methods to process their data. Some extensive method used is biometric authentication and voice recognition is better, since it paves the convenient manner to the user and it merely acquires the voice from the user. Also the background noise is in crisis with Mel Frequency Cepstrum Coefficient (MFCC) which is recognition algorithm where overcome by other tools such as smoothening filter etc. The main focus of this project is to investigate the feature extraction scheme.
The fifth generation (5G) communication technology is a standard for the broadband communication applicable for mobile communications. The entire network for any application is subdivided into many sub-geographical areas termed as cells. All these cells are connected through radio waves using internet or telecommunication network with the deployment of antennas in each cell. The antennas used for the 5G communications are controlled by special hardware implementation that increases the complexity of the network. To reduce the complexity of this hardware implementation, it is necessary to replace the hardware control by a pre-programmed software control.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.