SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2217
Survey Paper on
FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Ms. Rakshitha K S1, Priya J2, Sandhya S3, Thushara Kurup K R4
1Assistant Professor,Dept of CS&E,SKIT,Karnataka,India
2 Student, Dept of CS&E,SKIT,Karnataka,India
3 Student, Dept of CS&E,SKIT,Karnataka,India
4 Student, Dept of CS&E,SKIT,Karnataka,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Credit and debit card data thefts though were
the earliest forms of cybercrime they are the most common
cybercrimes. Attackers steal customer data by targeting the
Point of Sale (for short PoS) system, i.e. the point at which a
retailer first gets customer data. Modern PoS systems are
computers equipped with a card reader and running
specialized software to read the data. Increasingly user
devices are being used as input to the PoS. In these scenarios,
malware that can steal card data as soon as they are read by
the device has been developed. In the cases where customer
and vendor are persistently disconnected from the network,
there is no secure on-line payment. The paper describes
FRoDO, a secure off-line micro-payment solution that is
resistant to PoS data breaches. This improves over up to date
approaches in terms of flexibility and security. FRoDO is
probably the first solution that can providesecurefullyoff-line
payments while being resistant to all currently known PoS
breaches. We have made a survey on the previous solutions
that existed before FRoDO discovering their advantages and
disadvantages. Later we detail FRoDO architecture and
components.
Key Words: micro-payment, PUF,hash-chaining,genetic
algorithm, fraud-resilience.
1.INTRODUCTION
Market analysts have predicted that mobile payments will
over-take the traditional market, in providing greater
convenience to consumers and new sources of revenue to
many companies. This scenario produces a shift in purchase
methods from classic credit cardstonewapproachessuchas
mobile-based payments, giving new market players novel
business chances. Broadly supported by recent hardware,
mobile payment technology is still at its early stages of
development but it is expected to rise in the near future as
demonstrated by the growing interest in crypto-currencies.
At the present time, crypto-currencies and decentralized
payment systems (e.g. Bitcoin) are increasingly popular,
nurturing a shift from physical to digital currencies.
However, paymenttechniquesarenotyetcommonplace,due
to several unsolved issues, including a lack of widely-
accepted standards, limited interoperability amongsystems
and, most importantly, security.
Several retail organizationshavebeenvictimsofinformation
security breaches and payment data theft targeting
consumer payment card data and Personally Identifiable
Information
Although PoS ruptures are declining, they still remain an
extremely fulfilling endeavor for criminals. Customer data
can be used by cybercriminalsforfraudulentoperations,and
this led the payment card industry security standards
council to establish data security standards for all those
organizations that handle credit, debit and ATM cardholder
information. Irrespective of the structure of the electronic
payment system, PoS systems always handle acute
information and, often times, they also need remote
management. PoS systems act as gatewaysandrequiresome
sort of network connection in order to contact external
credit card processors. This is mandatory to authenticate
transactions. However, larger businesses that wish to tie
their PoS’s with other back-end systems may connect the
former to their own internal networks.Inaddition,toreduce
the amount of cost and simplify administration and
maintenance; PoS devices may be remotely managed over
these internal networks. However, a network connection
might not be available due to either a momentary network
service interruption or due to a permanent lack of network
coverage. Such on-line solutions are not very efficient since
remote communication can introduce interruptions in the
payment process. In this article,weproposeFRoDO,a secure
off-line micro-payment approach using multiple physical
unclonable functions.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2218
The main contributions of this article are:
 FRoDO features an identity element to validate the
customer, and a coin element wherecoins whichare
computed on-the-fly when needed.
 The vendor only converses with the identity
element in order to identify the user.
 The main advantage is a simpler, faster, and more
secure interface between the involved
actors/entities.
 The two-steps protocol allows the bank or the
coin element issuer to design digital coins to be
read only by a definite identity element, i.e. by a
specific user.
 The identity element used to improve the security
of
the users can also be used to impede malicious
users.
 This is the first solution that can provide secure
fully off-line payments while being robust to all
currently known PoS breaches.
[1]: Towards an Internet of Trust Issues and Solutions
for Identification and Authentication in the Internet of
Things.
For online scenarios this paper proposed a solution
based on the context and another one based on meta-data
synchronization. However both can be improved as:
CONNECT: Context-aware approach makes it possible to
detect sybil attackers when the majority of the network is
not malevolent. However, when the majority of the
surrounding things is malicious orwhena deviceneedstobe
moved within a new network for which it does not have any
information, context-aware approach might not work. Last
but not least, CONNECT is now based on a two-step
authentication protocol where the firststepismanual whilst
the second is self-directed. Using of a single step
authentication protocol that completelyremovesthehuman
factor should be included.
SUF: Our Software-based Unclonable Functions indicated to
be able to bring hardware intrinsic security properties such
as unclonability, tamper evidence and unpredictability to a
software-based authentication protocol. However, it relies
on a standard client-server model and assumes a universal
and persistent attacker as practically unfeasible. The design
of a distributed model where multiple clients and servercan
work together and where each client is assumed to be
malicious should be considered for this. The identification
and authentication solutions provided in thisthesisimprove
over the state of the art and show how an Internet of Trust is
possible. However, these solutions are not perfect and,since
attackers get more powerful over time as their knowledge
increase, the solutions still need some enhancements and
other approaches have to be examined.
[2]: Offline Micropayments without Trusted Hardware.
The paper demonstrated a simple and, for some
applications, practical scheme for offline micropayments
without the overhead of either secure hardware or online
transaction authorization. It represents a departure from the
usual approach to designing such systems. This paper
describes a platform that makes it possible to encode risk
management rules for offline micropayment. However the
paper does not throws light on the area of systems that
generate and adapt these rules to actual operational
conditions. Use of a Genetic algorithm to meet this short
coming could have improved the effectiveness of the paper.
The most important mechanism for limiting fraud and abuse
is the transaction limit encoded in the credentials. The kinds
of transactions permitted are determined according to the
risk management strategy of the account issuer, and are
designed to limit the usefulness to a thief of a compromised
user's credentials and secrets. For example, an encoded
strategy might permit the offline purchase of newspapers,
but only a few copies from any given vendor. If a user'sdevice
is stolen, the thief would be able to buy only newspapers, and
only as many as he can and vendors.
[3]: Implication of Secure Micropayment System Using
Process Oriented StructuralDesignbyHashchainingin
Mobile Network .
This paper describes using extra chains, it is able to
initiate payments to the new node in the new network. The
paper does not include in view of the trust and reputation
management for providing more safe and more consistent
operation in micropayments in wireless adhoc network.
The proposed system highlights a secure application for e-
payment system in offline via wireless mobile adhoc
network. The security of the application is governed by
Simple Public Key Infrastructure. Thedevelopmentofchains
of certificate allows a distribution of the payment system by
delegates. The designed model prevents dual expenditure in
offline communication. The proposed system shows a
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2219
flexible and robust solution for serviceability, security, and
effectiveness in e-payment systems over wireless mobile
adhoc network. The paper lacks design of security system
based on specific attack on mobile adhoc network like DDoS
or Wormhole attack, which is very common issue on pure
mobile network deployment in larger scale.
[4]: PayWord, MicroMint and Micropayment twosimple
micropayment schemes.
PayWord’sisbasedoncredit basedsystemforemost
goals is to minimize communication with the broker. As an
“off-line” structure,PayWorddoesnotrequirethevendorsto
interact with Broker for every payment. The Vendor only
needs to “clear” the payment once a day. The MicroMint
based on debit based system in their security on the notion
in which makes use of coin element ,the brokerproducesthe
coins then sells to user .the user uses these coins to pay to
vendor for the purchases made by them. In this a hacker
cannot break the hash function in a short period of time and
the fact that they can trace the users who use these coins. As
a result, the MicroMint scheme can prevent from counterfeit
and double spending effectively.
[5]: The Hardware Intrinsic Security from Physically
Unclonable Functions.
PUF consists of a physical object that is rigid to
clone due to its exclusive micro-scale properties or nano-
scale properties that originatefromthemanufactureprocess
variations. It resists physical attacks by causing loss to
structure when attempted to find the performance of
structure. The concept of a physical unclonable function
(PUF) forms the basic idea onwhich the proposal ofournew
key storage approach is built. Unclonability: PUFs are by
definition very tough to clone. This means that it takes a lot
of resources and a lot of time to make either a hardware
clone, a mathematical model of the behaviorofthestructure,
or a software program that can compute the response to a
challenge in a sensible quantity of time. In summary, a
radically new approach, hardware intrinsic security, is
available today to prevent cloning of semiconductor
products and preserve the returns ofthosecompanies. PUFs
are used to spawn the intrinsic fingerprint intrinsic in each
device which is combined with a inimitable activation code
to produce the furtive key. No key is actually stored in
hardware thus significantly raising the level of security
available beyond unconventional methods.
2. SYSTEM DESIGN
Our system design follows the FRoDO chief architecture is
composed of two main elements: an identity element and a
coin element. The coin element can be any hardware
constructed upon a physical unclonable function and it is
used to read digital coins in a reliable way. The identity
element has to be embedded into the customer device and it
is used to tie a specific coin element to a specific device. This
new design provides a two factor authentication to the
customer. In fact, the relationship between a coin element
and identity element prevents an attacker fromstealingcoin
elements that belong to other users.
Fig -1: FRoDO main architecture.
Identity Element:
Identity element consists of Key Generator which is used to
compute on-the-fly the private key of the identityelement.It
is Cryptographic Element used for symmetric and
asymmetric cryptographic algorithms applied to data
received in input and sent as output by the identity element.
Coin Element:
Coin element uses the Key Generator in which it is used to
compute on-the-fly the private key of the coin element. It is
also a Cryptographic Element which is used for symmetric
and asymmetric cryptographic algorithms applied to data
received in input and send as output by the coin element it
consist of Coin Selector which is liable fortheselectionofthe
right registers usedtogether withtheoutputvaluecomputed
by the coin element PUF in order to acquire the final coin
value .It consists of Coin Registers: used to store both PUF
input and output values required to recreate original coin
values. Coin registers consists of coin seed and coin helper
data. Coin seeds are used as input to the PUF whereas coin
helpers are used in order to reconstruct stable coin values
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2220
when the PUF is challenged. The figure also contains of
Erasable PUF is a read-once PUF After the first challenge,
even if the same input is used, the output will be arbitrary,
Coin Re-constructor is accountable to use the output
imminent from the PUF together with a coin helper in order
to reconstruct the actual value of the coin. The re-
constructor uses helper data stored into coin registers to
excerpt the original output from the PUF.
Key Generator:
The Key Generator element is used both within the identity
element and within the coin element. The main concern of
such an element is to compute on-the-fly the private key.
Such keys are used by the cryptographic elementstodecrypt
the requests and encrypt the replies.
Erasable Coin:
At the core of FRoDO proposal lies a read-once strong
physical unclonable function.Such PUF,usedtocompute on-
the-fly each coin, has the property that reading one value
terminates the original content by changing the behavior of
the PUF that will respond with haphazard data in further
challenges. Vendor’s coin requests do not contain the
erasable-PUF challenge by themselves, but they are used as
input to the coin selector. This latter one has information
about available funds for each register and it has the liability
of selecting the coin registers (one or more) that will be
involved in the transaction. The definite coin seed register is
then used as input to the erasable PUF, while the coin helper
register is united to the PUF output in order to recreate the
absolute value of the coin.
3. CONCLUSIONS
In this paper we have presented FRoDOthatis,thefirstdata-
breach-resilient fully off-line micropayment approach. The
security analysis shows that FRoDO does not levy
trustworthiness assumptions. Further, FRoDO is also the
first solution in the literature wherenocustomerdevicedata
outbreaks can be abusedtocompromisethesystem.This has
been achieved mainly by leveraging a unique erasable PUF
architecture and a novel protocol design. Additionally, our
proposal has been systematically discussed and compared
against the state of the art. Our analysis displays that FRoDO
is the only proposal that enjoys all theproperties essential to
a secure micro-payment solution, while also introducing
flexibility when allowing for the payment medium (types of
digital coins). To conclude, some open concerns have been
recognized that are left as future work. In particular, we are
inspecting the probability to allow digital changetobespent
over multiple off-line transactions while maintaining the
same level of security and usability.
REFERENCES
[1] Daza, Vanesa; Di Pietro, Roberto “Towards an Internet
of Trust Issues and Solutions for Identification and
Authentication in the Internet of Things”.
[2] M.Blaze, J.Feigenbaum, J.Ioannidis, and A.D.Keromytis.
“Offline MicropaymentswithoutTrustedHardware” The
Key Note Trust Management System Version 2.Internet
RFC 2704, September 1999.
[3] Zygmunt J. Haas, Jing Deng, Ben Liang,
PanagiotisPapadimitratos, S. Sajama,”Wireless ad hoc
Networks”,“ImplicationofSecureMicropaymentSystem
Using Process Oriented Structural Design by Hash
chaining in Mobile Network” John Wiley & Sons, Inc,
2003
[4] R.Rivest and A. Shamir. PayWord and MicroMint: Two
simple Micropayment schemes. May 7, 1996 “PayWord,
MicroMint and Micropayment: two simple
micropayment schemes
[5] C.Bssch, J. Guajardo, A.-R.Sadeghi,J. Shokrollahi,P.Tuyls,
in Efficient Helper Data Key Extractor on FPGAs.
Proceedings of CHES 2008.“Hardware Intrinsic Security
from Physically Unclonable Functions”
BIOGRAPHIES
Assistant Professor,Dept of
CS&E,SKIT,Karnataka,India
Student, Dept of
CS&E,SKIT,Karnataka,India
Student, Dept of
CS&E,SKIT,Karnataka,India
Student, Dept of
CS&E,SKIT,Karnataka,India
hor
Photo

More Related Content

What's hot

IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
IRJET Journal
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
IJERD Editor
 
Sms based otp
Sms based otpSms based otp
Sms based otp
Hai Nguyen
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
IRJET Journal
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scet
pankaj gamit
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
 
76 s201923
76 s20192376 s201923
76 s201923
IJRAT
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
IRJET Journal
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
Nick Owen
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
IRJET Journal
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
eSAT Publishing House
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
Hai Nguyen
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
Entrust Datacard
 

What's hot (20)

IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
Sms based otp
Sms based otpSms based otp
Sms based otp
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
 
Instant messaging tech scet
Instant messaging tech scetInstant messaging tech scet
Instant messaging tech scet
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
76 s201923
76 s20192376 s201923
76 s201923
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 

Similar to Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments

OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
IRJET Journal
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
IRJET Journal
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
IRJET Journal
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
Comparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable CredentialsComparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable Credentials
IRJET Journal
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )
Heather Vargas
 
IRJET- Secure Banking System using Block Chain Technology
IRJET-  	  Secure Banking System using Block Chain TechnologyIRJET-  	  Secure Banking System using Block Chain Technology
IRJET- Secure Banking System using Block Chain Technology
IRJET Journal
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET Journal
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
 
Symmetric Key Encryption Decryption Technique Using Image Based Key Generation
Symmetric Key Encryption Decryption Technique Using Image Based Key GenerationSymmetric Key Encryption Decryption Technique Using Image Based Key Generation
Symmetric Key Encryption Decryption Technique Using Image Based Key Generation
IRJET Journal
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
Lisa Brown
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
International Journal of Technical Research & Application
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
IRJET Journal
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET Journal
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET Journal
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
IRJET Journal
 
KYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAINKYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAIN
IRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
 

Similar to Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments (20)

OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
 
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
Comparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable CredentialsComparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable Credentials
 
Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )Mobile Ad Hoc Networks ( Manets )
Mobile Ad Hoc Networks ( Manets )
 
IRJET- Secure Banking System using Block Chain Technology
IRJET-  	  Secure Banking System using Block Chain TechnologyIRJET-  	  Secure Banking System using Block Chain Technology
IRJET- Secure Banking System using Block Chain Technology
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
Symmetric Key Encryption Decryption Technique Using Image Based Key Generation
Symmetric Key Encryption Decryption Technique Using Image Based Key GenerationSymmetric Key Encryption Decryption Technique Using Image Based Key Generation
Symmetric Key Encryption Decryption Technique Using Image Based Key Generation
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
KYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAINKYC VERIFICATION USING BLOCKCHAIN
KYC VERIFICATION USING BLOCKCHAIN
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
gaafergoudaay7aga
 

Recently uploaded (20)

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
 

Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2217 Survey Paper on FRoDO: Fraud Resilient Device for Off-Line Micro-Payments Ms. Rakshitha K S1, Priya J2, Sandhya S3, Thushara Kurup K R4 1Assistant Professor,Dept of CS&E,SKIT,Karnataka,India 2 Student, Dept of CS&E,SKIT,Karnataka,India 3 Student, Dept of CS&E,SKIT,Karnataka,India 4 Student, Dept of CS&E,SKIT,Karnataka,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Credit and debit card data thefts though were the earliest forms of cybercrime they are the most common cybercrimes. Attackers steal customer data by targeting the Point of Sale (for short PoS) system, i.e. the point at which a retailer first gets customer data. Modern PoS systems are computers equipped with a card reader and running specialized software to read the data. Increasingly user devices are being used as input to the PoS. In these scenarios, malware that can steal card data as soon as they are read by the device has been developed. In the cases where customer and vendor are persistently disconnected from the network, there is no secure on-line payment. The paper describes FRoDO, a secure off-line micro-payment solution that is resistant to PoS data breaches. This improves over up to date approaches in terms of flexibility and security. FRoDO is probably the first solution that can providesecurefullyoff-line payments while being resistant to all currently known PoS breaches. We have made a survey on the previous solutions that existed before FRoDO discovering their advantages and disadvantages. Later we detail FRoDO architecture and components. Key Words: micro-payment, PUF,hash-chaining,genetic algorithm, fraud-resilience. 1.INTRODUCTION Market analysts have predicted that mobile payments will over-take the traditional market, in providing greater convenience to consumers and new sources of revenue to many companies. This scenario produces a shift in purchase methods from classic credit cardstonewapproachessuchas mobile-based payments, giving new market players novel business chances. Broadly supported by recent hardware, mobile payment technology is still at its early stages of development but it is expected to rise in the near future as demonstrated by the growing interest in crypto-currencies. At the present time, crypto-currencies and decentralized payment systems (e.g. Bitcoin) are increasingly popular, nurturing a shift from physical to digital currencies. However, paymenttechniquesarenotyetcommonplace,due to several unsolved issues, including a lack of widely- accepted standards, limited interoperability amongsystems and, most importantly, security. Several retail organizationshavebeenvictimsofinformation security breaches and payment data theft targeting consumer payment card data and Personally Identifiable Information Although PoS ruptures are declining, they still remain an extremely fulfilling endeavor for criminals. Customer data can be used by cybercriminalsforfraudulentoperations,and this led the payment card industry security standards council to establish data security standards for all those organizations that handle credit, debit and ATM cardholder information. Irrespective of the structure of the electronic payment system, PoS systems always handle acute information and, often times, they also need remote management. PoS systems act as gatewaysandrequiresome sort of network connection in order to contact external credit card processors. This is mandatory to authenticate transactions. However, larger businesses that wish to tie their PoS’s with other back-end systems may connect the former to their own internal networks.Inaddition,toreduce the amount of cost and simplify administration and maintenance; PoS devices may be remotely managed over these internal networks. However, a network connection might not be available due to either a momentary network service interruption or due to a permanent lack of network coverage. Such on-line solutions are not very efficient since remote communication can introduce interruptions in the payment process. In this article,weproposeFRoDO,a secure off-line micro-payment approach using multiple physical unclonable functions.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2218 The main contributions of this article are:  FRoDO features an identity element to validate the customer, and a coin element wherecoins whichare computed on-the-fly when needed.  The vendor only converses with the identity element in order to identify the user.  The main advantage is a simpler, faster, and more secure interface between the involved actors/entities.  The two-steps protocol allows the bank or the coin element issuer to design digital coins to be read only by a definite identity element, i.e. by a specific user.  The identity element used to improve the security of the users can also be used to impede malicious users.  This is the first solution that can provide secure fully off-line payments while being robust to all currently known PoS breaches. [1]: Towards an Internet of Trust Issues and Solutions for Identification and Authentication in the Internet of Things. For online scenarios this paper proposed a solution based on the context and another one based on meta-data synchronization. However both can be improved as: CONNECT: Context-aware approach makes it possible to detect sybil attackers when the majority of the network is not malevolent. However, when the majority of the surrounding things is malicious orwhena deviceneedstobe moved within a new network for which it does not have any information, context-aware approach might not work. Last but not least, CONNECT is now based on a two-step authentication protocol where the firststepismanual whilst the second is self-directed. Using of a single step authentication protocol that completelyremovesthehuman factor should be included. SUF: Our Software-based Unclonable Functions indicated to be able to bring hardware intrinsic security properties such as unclonability, tamper evidence and unpredictability to a software-based authentication protocol. However, it relies on a standard client-server model and assumes a universal and persistent attacker as practically unfeasible. The design of a distributed model where multiple clients and servercan work together and where each client is assumed to be malicious should be considered for this. The identification and authentication solutions provided in thisthesisimprove over the state of the art and show how an Internet of Trust is possible. However, these solutions are not perfect and,since attackers get more powerful over time as their knowledge increase, the solutions still need some enhancements and other approaches have to be examined. [2]: Offline Micropayments without Trusted Hardware. The paper demonstrated a simple and, for some applications, practical scheme for offline micropayments without the overhead of either secure hardware or online transaction authorization. It represents a departure from the usual approach to designing such systems. This paper describes a platform that makes it possible to encode risk management rules for offline micropayment. However the paper does not throws light on the area of systems that generate and adapt these rules to actual operational conditions. Use of a Genetic algorithm to meet this short coming could have improved the effectiveness of the paper. The most important mechanism for limiting fraud and abuse is the transaction limit encoded in the credentials. The kinds of transactions permitted are determined according to the risk management strategy of the account issuer, and are designed to limit the usefulness to a thief of a compromised user's credentials and secrets. For example, an encoded strategy might permit the offline purchase of newspapers, but only a few copies from any given vendor. If a user'sdevice is stolen, the thief would be able to buy only newspapers, and only as many as he can and vendors. [3]: Implication of Secure Micropayment System Using Process Oriented StructuralDesignbyHashchainingin Mobile Network . This paper describes using extra chains, it is able to initiate payments to the new node in the new network. The paper does not include in view of the trust and reputation management for providing more safe and more consistent operation in micropayments in wireless adhoc network. The proposed system highlights a secure application for e- payment system in offline via wireless mobile adhoc network. The security of the application is governed by Simple Public Key Infrastructure. Thedevelopmentofchains of certificate allows a distribution of the payment system by delegates. The designed model prevents dual expenditure in offline communication. The proposed system shows a
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2219 flexible and robust solution for serviceability, security, and effectiveness in e-payment systems over wireless mobile adhoc network. The paper lacks design of security system based on specific attack on mobile adhoc network like DDoS or Wormhole attack, which is very common issue on pure mobile network deployment in larger scale. [4]: PayWord, MicroMint and Micropayment twosimple micropayment schemes. PayWord’sisbasedoncredit basedsystemforemost goals is to minimize communication with the broker. As an “off-line” structure,PayWorddoesnotrequirethevendorsto interact with Broker for every payment. The Vendor only needs to “clear” the payment once a day. The MicroMint based on debit based system in their security on the notion in which makes use of coin element ,the brokerproducesthe coins then sells to user .the user uses these coins to pay to vendor for the purchases made by them. In this a hacker cannot break the hash function in a short period of time and the fact that they can trace the users who use these coins. As a result, the MicroMint scheme can prevent from counterfeit and double spending effectively. [5]: The Hardware Intrinsic Security from Physically Unclonable Functions. PUF consists of a physical object that is rigid to clone due to its exclusive micro-scale properties or nano- scale properties that originatefromthemanufactureprocess variations. It resists physical attacks by causing loss to structure when attempted to find the performance of structure. The concept of a physical unclonable function (PUF) forms the basic idea onwhich the proposal ofournew key storage approach is built. Unclonability: PUFs are by definition very tough to clone. This means that it takes a lot of resources and a lot of time to make either a hardware clone, a mathematical model of the behaviorofthestructure, or a software program that can compute the response to a challenge in a sensible quantity of time. In summary, a radically new approach, hardware intrinsic security, is available today to prevent cloning of semiconductor products and preserve the returns ofthosecompanies. PUFs are used to spawn the intrinsic fingerprint intrinsic in each device which is combined with a inimitable activation code to produce the furtive key. No key is actually stored in hardware thus significantly raising the level of security available beyond unconventional methods. 2. SYSTEM DESIGN Our system design follows the FRoDO chief architecture is composed of two main elements: an identity element and a coin element. The coin element can be any hardware constructed upon a physical unclonable function and it is used to read digital coins in a reliable way. The identity element has to be embedded into the customer device and it is used to tie a specific coin element to a specific device. This new design provides a two factor authentication to the customer. In fact, the relationship between a coin element and identity element prevents an attacker fromstealingcoin elements that belong to other users. Fig -1: FRoDO main architecture. Identity Element: Identity element consists of Key Generator which is used to compute on-the-fly the private key of the identityelement.It is Cryptographic Element used for symmetric and asymmetric cryptographic algorithms applied to data received in input and sent as output by the identity element. Coin Element: Coin element uses the Key Generator in which it is used to compute on-the-fly the private key of the coin element. It is also a Cryptographic Element which is used for symmetric and asymmetric cryptographic algorithms applied to data received in input and send as output by the coin element it consist of Coin Selector which is liable fortheselectionofthe right registers usedtogether withtheoutputvaluecomputed by the coin element PUF in order to acquire the final coin value .It consists of Coin Registers: used to store both PUF input and output values required to recreate original coin values. Coin registers consists of coin seed and coin helper data. Coin seeds are used as input to the PUF whereas coin helpers are used in order to reconstruct stable coin values
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2220 when the PUF is challenged. The figure also contains of Erasable PUF is a read-once PUF After the first challenge, even if the same input is used, the output will be arbitrary, Coin Re-constructor is accountable to use the output imminent from the PUF together with a coin helper in order to reconstruct the actual value of the coin. The re- constructor uses helper data stored into coin registers to excerpt the original output from the PUF. Key Generator: The Key Generator element is used both within the identity element and within the coin element. The main concern of such an element is to compute on-the-fly the private key. Such keys are used by the cryptographic elementstodecrypt the requests and encrypt the replies. Erasable Coin: At the core of FRoDO proposal lies a read-once strong physical unclonable function.Such PUF,usedtocompute on- the-fly each coin, has the property that reading one value terminates the original content by changing the behavior of the PUF that will respond with haphazard data in further challenges. Vendor’s coin requests do not contain the erasable-PUF challenge by themselves, but they are used as input to the coin selector. This latter one has information about available funds for each register and it has the liability of selecting the coin registers (one or more) that will be involved in the transaction. The definite coin seed register is then used as input to the erasable PUF, while the coin helper register is united to the PUF output in order to recreate the absolute value of the coin. 3. CONCLUSIONS In this paper we have presented FRoDOthatis,thefirstdata- breach-resilient fully off-line micropayment approach. The security analysis shows that FRoDO does not levy trustworthiness assumptions. Further, FRoDO is also the first solution in the literature wherenocustomerdevicedata outbreaks can be abusedtocompromisethesystem.This has been achieved mainly by leveraging a unique erasable PUF architecture and a novel protocol design. Additionally, our proposal has been systematically discussed and compared against the state of the art. Our analysis displays that FRoDO is the only proposal that enjoys all theproperties essential to a secure micro-payment solution, while also introducing flexibility when allowing for the payment medium (types of digital coins). To conclude, some open concerns have been recognized that are left as future work. In particular, we are inspecting the probability to allow digital changetobespent over multiple off-line transactions while maintaining the same level of security and usability. REFERENCES [1] Daza, Vanesa; Di Pietro, Roberto “Towards an Internet of Trust Issues and Solutions for Identification and Authentication in the Internet of Things”. [2] M.Blaze, J.Feigenbaum, J.Ioannidis, and A.D.Keromytis. “Offline MicropaymentswithoutTrustedHardware” The Key Note Trust Management System Version 2.Internet RFC 2704, September 1999. [3] Zygmunt J. Haas, Jing Deng, Ben Liang, PanagiotisPapadimitratos, S. Sajama,”Wireless ad hoc Networks”,“ImplicationofSecureMicropaymentSystem Using Process Oriented Structural Design by Hash chaining in Mobile Network” John Wiley & Sons, Inc, 2003 [4] R.Rivest and A. Shamir. PayWord and MicroMint: Two simple Micropayment schemes. May 7, 1996 “PayWord, MicroMint and Micropayment: two simple micropayment schemes [5] C.Bssch, J. Guajardo, A.-R.Sadeghi,J. Shokrollahi,P.Tuyls, in Efficient Helper Data Key Extractor on FPGAs. Proceedings of CHES 2008.“Hardware Intrinsic Security from Physically Unclonable Functions” BIOGRAPHIES Assistant Professor,Dept of CS&E,SKIT,Karnataka,India Student, Dept of CS&E,SKIT,Karnataka,India Student, Dept of CS&E,SKIT,Karnataka,India Student, Dept of CS&E,SKIT,Karnataka,India hor Photo