CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Novel Approach for Enhancing Security in Smart Cards using Biometrics

by P. Praveen, S. Balaji, A.s.n.chakravarthy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 8
Year of Publication: 2012
Authors: P. Praveen, S. Balaji, A.s.n.chakravarthy
10.5120/5717-7777

P. Praveen, S. Balaji, A.s.n.chakravarthy . A Novel Approach for Enhancing Security in Smart Cards using Biometrics. International Journal of Computer Applications. 42, 8 ( March 2012), 37-42. DOI=10.5120/5717-7777

@article{ 10.5120/5717-7777,
author = { P. Praveen, S. Balaji, A.s.n.chakravarthy },
title = { A Novel Approach for Enhancing Security in Smart Cards using Biometrics },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 8 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number8/5717-7777/ },
doi = { 10.5120/5717-7777 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:50.365789+05:30
%A P. Praveen
%A S. Balaji
%A A.s.n.chakravarthy
%T A Novel Approach for Enhancing Security in Smart Cards using Biometrics
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 8
%P 37-42
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

To provide security in Smart cards is a challenging problem because now-a-days the use of smart cards is being increased. Biometrics is one among the security providing issues which shows the path to increase the level of security in smart cards. Here the biometric template is stored in the memory of the smart card as well as the databases of the servers. The authentication is performed at the both sides i. e. ,in smart card and central server. After the essential authentication and verification levels only,smart card can be accessed

References
  1. SearchSecurity: http://searchsecurity. techtarget. com/definition/biometrics (19 March 2012).
  2. Smartcardalliance: www. smartcardalliance. com (12 January 2012).
  3. R. Das, "Introduction To Smart Card", Bimaquest - Vol. Iv Issue I1, July 2004
  4. Bart Jacobs and Erik Poll, "Biometrics and Smart Cards in Identity Management" Radboud University Nijmegen,February 15,2010
  5. Claude Barrala, "Biometrics & Security: Combining Fingerprints, Smart Cards and Cryptography", 2010.
  6. "Xiong Li a, Jian-Wei Niu b, Jian Maa, Wen-Dong Wanga, Cheng-Lian Liu c, "Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards" Journal of Network and Computer Applications 34 (2011) 73–79.
  7. Smart Card Basics: www. smartcardbasics. com (5 January 2012).
  8. Luca Bechelli, Stefano Bistarelli and Stefano Frassi, "A protocol for simulating Match-on-Card authentication through the use of Template-on-Card technology", 2003.
  9. De-song Wang, Jian-ping Li, "A Novel Mutual Authentication Scheme Based on Fingerprint Biometric and Nonce Using Smart Cards" International Journal of Security and Its Applications Vol. 5 No. 4, October, 2011.
  10. A Smart Card Alliance Physical Access Council White Paper, "Smart Cards and Biometrics" March 2011, Publication Number: PAC-11002.
  11. P. Grother "Performance of fingerprint match-on-card algorithms". Technical report, National Institute of Standards and Technology, 2008, 2009.
  12. Carmit, Hazayy, Yehuda, Lindelly "Constructions of Truly Practical Secure Protocols using Standard Smartcards"February 23, 2009.
  13. Sandeep Kumar Sood , "An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol" International Journal of Network Security, Vol. 13, No. 3, PP. 208-215, Nov. 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Biometrics Data Security Smartcards Verification