🕔 Call For Paper — Vol. 13 | Issue 5 | May 2026 | Deadline: 31-May-2026
Track Paper Submit Paper Home
📢 NOTICE
📢 Call for Papers — Volume 13, Issue 5 (May 2026) | Submission Deadline: May 31, 2026 | Rapid peer review: 2–3 days | Impact Factor: 7.37 (SJIF 2026)

Paper Details

📄 IJAERD-OJS-4334

METHODTO SECURE CRITICAL TRANSCATIONS: COMBINNING THREE WAY & TWO FACTOR AUTHENTICATION

Author(s):Yoga Lakshmi.P
Institution:Assistant professor, SRMIST, Kattankulathur, Chennai
Published In:Vol. 6, Issue 7 — July 2019
Page No.:116-124
Domain:Engineering
Type:Research Paper
ISSN (Online):2348-4470
ISSN (Print):2348-6406
Abstract

In the current global scenario, people have migrated from being citizens to netizens where card transactionsare most prominent at Automatic Teller Machines (ATM), Online transactions and Point of Sale(POS) terminals. Cardbreaches are also increasing that leads to many billion dollars of loss by compromising the merchant’s server to get carddetails including account number,Personal Identification Number (PIN) and Card Verification Value (CVV). At present, PINis the only factor that authenticates any transaction. Apart from that, a very few banks send One Time Password (OTP) forATM and online transactions which is not completely secure. Present systems do not have enough mechanisms to validate orcheck who initiates the transaction. This paper proposes to introduce a system in which the user’s smart phone is used tosecure card transactions by combining 3 way authentication and 2 factor authentication. Firstly, it checks the card holder’sbiometric viz., Finger print while a transaction is initiated. Secondly, OTP is neither sent nor received but it is autogenerated in the user’s smart phone which sends a trigger to the bank server that generates the same random number. Thissystem proposes to use a secure OTP generator algorithm that uses combinedSecure Hash Algorithm 1(SHA1), Hash BasedMethod Authentication Code (HMAC) HMAC-SHA256 and HMAC-MD5. The user enters the OTP after entering the PIN andit gets validated that the authorized person is the one who has initiated the transaction. Thus, reasonably securing a cardtransaction as it mandates the presence of the card holder for every transaction to be authenticated.

🗎 Download PDF 🏆 Get Certificate
🕮 How to Cite

Yoga Lakshmi.P, “METHODTO SECURE CRITICAL TRANSCATIONS: COMBINNING THREE WAY & TWO FACTOR AUTHENTICATION”, International Journal of Advance Engineering and Research Development (IJAERD), Vol. 6, Issue 7, pp. 116-124, July 2019.

Related Papers

📄 Submit Your Paper

Open Access • Peer Reviewed • CrossRef DOI
UGC Approved • Monthly Publication

Submit Now →
📅 Submission Deadline
31 May 2026
Vol. 13 | Issue 5
May 2026