Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card

Krishna Prakasha, Balachandra Muniyal, Vasundhara Acharya

Research output: Contribution to journalArticle

Abstract

Identification and authentication play a significant role in security controls. The manual process of user identification and authentication is time-consuming and tedious. The proposed research work aims to overcome this drawback and achieve user identification and authentication through an automated method using the Aadhar card. Aadhar project is developed by the Unique Identification Authority of India by merging biometrics and digitization. The details are stored in the form of a quick response code along with a 12-digit Aadhar card number. A model is built to capture the information from the Aadhar card. The mobile phones are used to obtain the data from the Aadhar card. The user validation is through two-step process using One Time Password and email address. The wireless public key infrastructure issues a digital certificate to the valid user. The proposed authentication and symmetric key exchange algorithm are formally verified and analyzed using automated validation of Internet security protocols and applications. The result of simulation proves that the proposed scheme is secure and safe. The experimental results show that time consumption for user authentication is acceptable. The acceptance of the proposed automated user identification and authentication model is authorized using a modified technology acceptance model. The result proves that there exists a strong relationship between the perceived usefulness of items and the Attribute Of Use (AOU). It also exhibits that the association between the AOU and user satisfaction is influential. The model demonstrates that the association between the Perceived Ease Of Use and attribute towards use is weak. The influence of exogenous variables over endogenous variables exhibits that the proposed model outperforms the traditional manual system and the target users are inclined towards it. The proposed model also finds its application in services which requires user authentication.

Original languageEnglish
Article number8630929
Pages (from-to)17981-18007
Number of pages27
JournalIEEE Access
Volume7
DOIs
Publication statusPublished - 01-01-2019

Fingerprint

Mobile devices
Authentication
Analog to digital conversion
Electronic mail
Biometrics
Mobile phones
Merging
Identification (control systems)
Internet
Network protocols

All Science Journal Classification (ASJC) codes

  • Computer Science(all)
  • Materials Science(all)
  • Engineering(all)

Cite this

@article{50ed57308a9244228529d41725729f71,
title = "Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card",
abstract = "Identification and authentication play a significant role in security controls. The manual process of user identification and authentication is time-consuming and tedious. The proposed research work aims to overcome this drawback and achieve user identification and authentication through an automated method using the Aadhar card. Aadhar project is developed by the Unique Identification Authority of India by merging biometrics and digitization. The details are stored in the form of a quick response code along with a 12-digit Aadhar card number. A model is built to capture the information from the Aadhar card. The mobile phones are used to obtain the data from the Aadhar card. The user validation is through two-step process using One Time Password and email address. The wireless public key infrastructure issues a digital certificate to the valid user. The proposed authentication and symmetric key exchange algorithm are formally verified and analyzed using automated validation of Internet security protocols and applications. The result of simulation proves that the proposed scheme is secure and safe. The experimental results show that time consumption for user authentication is acceptable. The acceptance of the proposed automated user identification and authentication model is authorized using a modified technology acceptance model. The result proves that there exists a strong relationship between the perceived usefulness of items and the Attribute Of Use (AOU). It also exhibits that the association between the AOU and user satisfaction is influential. The model demonstrates that the association between the Perceived Ease Of Use and attribute towards use is weak. The influence of exogenous variables over endogenous variables exhibits that the proposed model outperforms the traditional manual system and the target users are inclined towards it. The proposed model also finds its application in services which requires user authentication.",
author = "Krishna Prakasha and Balachandra Muniyal and Vasundhara Acharya",
year = "2019",
month = "1",
day = "1",
doi = "10.1109/ACCESS.2019.2896324",
language = "English",
volume = "7",
pages = "17981--18007",
journal = "IEEE Access",
issn = "2169-3536",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card. / Prakasha, Krishna; Muniyal, Balachandra; Acharya, Vasundhara.

In: IEEE Access, Vol. 7, 8630929, 01.01.2019, p. 17981-18007.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card

AU - Prakasha, Krishna

AU - Muniyal, Balachandra

AU - Acharya, Vasundhara

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Identification and authentication play a significant role in security controls. The manual process of user identification and authentication is time-consuming and tedious. The proposed research work aims to overcome this drawback and achieve user identification and authentication through an automated method using the Aadhar card. Aadhar project is developed by the Unique Identification Authority of India by merging biometrics and digitization. The details are stored in the form of a quick response code along with a 12-digit Aadhar card number. A model is built to capture the information from the Aadhar card. The mobile phones are used to obtain the data from the Aadhar card. The user validation is through two-step process using One Time Password and email address. The wireless public key infrastructure issues a digital certificate to the valid user. The proposed authentication and symmetric key exchange algorithm are formally verified and analyzed using automated validation of Internet security protocols and applications. The result of simulation proves that the proposed scheme is secure and safe. The experimental results show that time consumption for user authentication is acceptable. The acceptance of the proposed automated user identification and authentication model is authorized using a modified technology acceptance model. The result proves that there exists a strong relationship between the perceived usefulness of items and the Attribute Of Use (AOU). It also exhibits that the association between the AOU and user satisfaction is influential. The model demonstrates that the association between the Perceived Ease Of Use and attribute towards use is weak. The influence of exogenous variables over endogenous variables exhibits that the proposed model outperforms the traditional manual system and the target users are inclined towards it. The proposed model also finds its application in services which requires user authentication.

AB - Identification and authentication play a significant role in security controls. The manual process of user identification and authentication is time-consuming and tedious. The proposed research work aims to overcome this drawback and achieve user identification and authentication through an automated method using the Aadhar card. Aadhar project is developed by the Unique Identification Authority of India by merging biometrics and digitization. The details are stored in the form of a quick response code along with a 12-digit Aadhar card number. A model is built to capture the information from the Aadhar card. The mobile phones are used to obtain the data from the Aadhar card. The user validation is through two-step process using One Time Password and email address. The wireless public key infrastructure issues a digital certificate to the valid user. The proposed authentication and symmetric key exchange algorithm are formally verified and analyzed using automated validation of Internet security protocols and applications. The result of simulation proves that the proposed scheme is secure and safe. The experimental results show that time consumption for user authentication is acceptable. The acceptance of the proposed automated user identification and authentication model is authorized using a modified technology acceptance model. The result proves that there exists a strong relationship between the perceived usefulness of items and the Attribute Of Use (AOU). It also exhibits that the association between the AOU and user satisfaction is influential. The model demonstrates that the association between the Perceived Ease Of Use and attribute towards use is weak. The influence of exogenous variables over endogenous variables exhibits that the proposed model outperforms the traditional manual system and the target users are inclined towards it. The proposed model also finds its application in services which requires user authentication.

UR - http://www.scopus.com/inward/record.url?scp=85062220112&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85062220112&partnerID=8YFLogxK

U2 - 10.1109/ACCESS.2019.2896324

DO - 10.1109/ACCESS.2019.2896324

M3 - Article

VL - 7

SP - 17981

EP - 18007

JO - IEEE Access

JF - IEEE Access

SN - 2169-3536

M1 - 8630929

ER -