作者: Abhishek Roy , Sumita Sarkar
DOI:
关键词: Smart card 、 MULTOS 、 Multi-factor authentication 、 Common Access Card 、 Java Card 、 Contactless smart card 、 Computer security 、 OpenPGP card 、 Open Smart Card Development Platform 、 Computer science
摘要: ABSTRACTWith large scale proliferation of internet and network, more people tend to communicate through the insecure network channels. So, avoid illegal access confidential private resources, user authentication is primary requirement this age. Nowadays, smart card based schemes have been deployed widely ensure legitimacy a user's request. Smart cards can be associated with other traditional like password or PIN, enhance security level system. In recent years, numerous researchers focused on field figured out new advanced secure mechanism by employing biometrics as an tool in systems. paper, authors made detailed survey some eminent existing biometric technique schemes. Since several pitfalls are susceptible dangerous attacks, study will pave way towards evolution ideal scheme that attain every possible goals.Keywords: Biometrics, authentication, non-repudiation, card.INTRODUCTION:In web-enabled world, where well-intended technological advancements makes its fate soon abused someone malevolent, it become very crucial for us bring into existence optimal solution provide reliable service all facets our modem life. With advancement science, individuals move vital information effortlessly help technology. This appliance not only used storage device but also play significant inevitable role proving remote identification secured ICT But, usual, these easy use, portable, intelligent devices free from mal-intentions fraudsters. To get rid frequent severe fraudulent anti-attack were undertaken researchers. Password [36, 37], Dynamic ID-based [38, 39], time stamp [40, 41], nonce [42, 43], etc. their creations. last few technology named has spurred great deal interest research achieved height popularity electronic personal authorization at POS (Point Sale) terminals. Biometrics when combined creates tight bond between cardholder. we carried thorough over such biometric-based using cards.Section II describes need authentication. Section III includes literature Conclusion drawn entire mentioned IV. V contains references.NECESSITY OF BIOMETRICS FOR IMPLEMENTATION AUTHENTICATION IN SMART CARDS:Biometrics effective implemented section give overview discuss working technology.a) CARD TECHNOLOGY:A [44, 45, 46] which externally plastic containing embedded integrated computer chip i.e., ICC (a microprocessor without memory) it. capable storing up 64Kbytes [45]; performing own processing functions read terminal via readers [52], The stored techniques viz., cryptographic digital signature …