Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card

Krishna Prakasha, K and Muniyal, Balachandra and Acharya, Vasundara (2019) Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card. IEEE Access, 7 (1). pp. 17981-18007. ISSN 2169-3536

[img] PDF
6186.pdf - Published Version
Restricted to Registered users only

Download (2MB) | Request a copy


Identification and authentication play a significant role in security controls. The manual process of user identification and authentication is time-consuming and tedious. The proposed research work aims to overcome this drawback and achieve user identification and authentication through an automated method using the Aadhar card. Aadhar project is developed by the Unique Identification Authority of India by merging biometrics and digitization. The details are stored in the form of a quick response code along with a 12-digit Aadhar card number. A model is built to capture the information from the Aadhar card. The mobile phones are used to obtain the data from the Aadhar card. The user validation is through twostep process using One Time Password and email address. The wireless public key infrastructure issues a digital certificate to the valid user. The proposed authentication and symmetric key exchange algorithm are formally verified and analyzed using automated validation of Internet security protocols and applications. The result of simulation proves that the proposed scheme is secure and safe. The experimental results show that time consumption for user authentication is acceptable. The acceptance of the proposed automated user identification and authentication model is authorized using a modified technology acceptance model. The result proves that there exists a strong relationship between the perceived usefulness of items and the Attribute Of Use (AOU). It also exhibits that the association between the AOU and user satisfaction is influential. The model demonstrates that the association between the Perceived Ease Of Use and attribute towards use is weak. The influence of exogenous variables over endogenous variables exhibits that the proposed model outperforms the traditional manual system and the target users are inclined towards it. The proposed model also finds its application in services which requires user authentication

Item Type: Article
Uncontrolled Keywords: Aadhar card, authentication, security, TAM, WPKI.
Subjects: Engineering > MIT Manipal > Computer Science and Engineering
Engineering > MIT Manipal > Information and Communication Technology
Depositing User: MIT Library
Date Deposited: 25 Feb 2019 06:31
Last Modified: 25 Feb 2019 06:31

Actions (login required)

View Item View Item