Know your customer (KYC) based authentication method for financial services through the internet

Loading...
Thumbnail Image
File version

Accepted Manuscript (AM)

Author(s)
Mondal, Prakash Chandra
Deb, Rupam
Huda, Mohammad Nurul
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2016
Size
File type(s)
Location

Dhaka, Bangladesh

License
Abstract

Financial services through the internet are running under various threats like phishing, pharming (cyber attack intended to redirect a website's traffic to another fake site), malware, and evolving sophistication of compromise techniques. Multi-factor authentication (MFA) financial service system alleviates the risk and makes it secure. Various methods of MFA run in troubles like the authentication device lost or stolen, false sense of security (if used on login device), compromised answer of the generic question, higher implementation costs, unambiguous movement profile, calculated hash value stolen (there is no chance to replace it), etc. Compliance with Anti-Money Laundering (AML), Know Your Customer (KYC) and sanction requirements continue to be a key focus area for Financial Institutions' (FIs) management; firms must ensure that they are following appropriate compliance procedures to meet the increasing regulatory demands [1,2]. By addressing existing limitation of MFA, this paper proposes dynamic KYC based MFA authentication method to ensure the secured access of the financial services through the internet. Analysis and simulation results show that the proposed method provides control same as existing MFA/2FA techniques, but customers will get relief from holding additional security devices that incur huge cost.

Journal Title
Conference Title

Proceeding of the 19th International Conference on Computer and Information Technology

Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Item Access Status
Note
Access the data
Related item(s)
Subject

Other information and computing sciences not elsewhere classified

Persistent link to this record
Citation