2019
DOI: 10.11591/ijece.v9i3.pp1879-1886
|View full text |Cite
|
Sign up to set email alerts
|

Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication

Abstract: The tumultuous increase in ATM attacks using eavesdropping, shoulder-surfing, has risen great concerns. Attackers often target the authentication stage where a customer may be entering his login information on the ATM and thus use direct observation techniques by looking over the customer's shoulder to steal his passwords. Existing authentication mechanism employs the traditional password-based authentication system which fails to curb these attacks. This paper addresses this problem using the FingerEye. The F… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Based on crypto-analysis report on virtual currency scams (investors.org, 2022), over 750 million Naira has been lost to Ponzi schemes. Based on their report there is an indication that financial security 7 is a serious issue in the blockchain ecosystem 8 . Hence, identifying Ponzi schemes in Ethereum will protect investors’ interests and at the same time reduce the losses incurred by investors.…”
Section: Introductionmentioning
confidence: 99%
“…Based on crypto-analysis report on virtual currency scams (investors.org, 2022), over 750 million Naira has been lost to Ponzi schemes. Based on their report there is an indication that financial security 7 is a serious issue in the blockchain ecosystem 8 . Hence, identifying Ponzi schemes in Ethereum will protect investors’ interests and at the same time reduce the losses incurred by investors.…”
Section: Introductionmentioning
confidence: 99%
“…If the user does so, they may be unwittingly installing malware on their computer. Exfiltration over physical media (EoPM) is a technique that can be used to exfiltrate data from a secure network across an insecure medium [6][7][8][9][10][11]21]. The term was coined in 2006 by security researcher Michael Ossmann and has been used primarily in the context of computer security [7].…”
Section: Methodsmentioning
confidence: 99%
“…This makes it an ideal tool for gaining access to or extracting data from a target network [16]. In this poster, we will discuss how it can be used for data exfiltration [3,[6][7][8][9][10][11][21][22][23]. Finally, regarding the motivations of using Bash Bunny, the Bash Bunny is a powerful USB device created for penetration testers and security professionals.…”
Section: First Need To Acquire Initial Access) Access To Start Withmentioning
confidence: 99%
“…The three building blocks of a blockchain are shown in the Figure 1. -Encryption and cryptography: These ensure security services such as authentication, authorization, non-repudiation and confidentiality [8,9]. -Consensus mechanisms: These are the algorithms used to decide, whether, a new block of validated transactions should be added to the chain or rejected.…”
Section: Building Blocks Of a Blockchainmentioning
confidence: 99%