Abstract
Online transactions provide benefits to the customer and financial organization in terms of reducing operating cost, time, efforts, papers, and increasing the comfort and ease. Beside these benefits online transaction has a side effect likeforged online transaction. This side effect results in loss of money. This forged online transaction is performed by fraudsters who are well equipped with the dynamic novel idea to steal an amount of money from the customer through online transaction. Although security measures are already implemented this forged online transactions are increasing every year. This is happening due to fraudsters creating novel ideas continuously to perform forged online transaction. Therefore, security measures need improvements continuously on a regular basis. The key aspiration of this paper is to create an improved authentication technique to prevent forged online transaction. This study produces an enhanced authentication using a mobile application to mitigate online transaction fraud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bhatla, T.P., Prabhu, V., Dua, A.: Understanding credit card frauds. Cards Bus. Rev. 1(6), (2003)
Kulat, A., Kulkarni, R., Bhagwat, N., Desai, K., Kulkarni, M.P.: Prevention of online transaction frauds using OTP generation based on dual layer security mechanism. Int. Res. J. Eng. Technol. (IRJET). 3(4), 1058–1060 (2016)
Jamdar, P.A., Bendale, S.K., Durgawale, D.A.: Secure mechanism for credit/debit card transaction fraud detection by using fingerprint authentication system. Int. J. Comput. Sci. Netw. Secur. (IJCSNS). 16(3), 35–38 (2016)
Khattri, V., Singh, D.K.: A Novel Distance Authentication Mechanism to Prevent the Online Transaction Fraud, pp. 157–169. Advances in Fire and Process Safety, Springer, Singapore (2018)
Singh, P., Singh, M.: Fraud detection by monitoring customer behavior and activities. Int. J. Comput. Appl. 111(11), 23–32 (2015)
Prakash, A., Chandrasekar, C.: An optimized multiple semi-hidden markov model for credit card fraud detection. Indian J. Sci. Technol. 8(2), 165–171 (2015)
Khan, M.Z., Pathan, J.D., Ahmed, A.H.E.: Credit card fraud detection system using hidden markov model and k-clustering. Int. J. Adv. Res. Comput. Commun. Eng. 3(2), 5458–5461 (2014)
Bekirev, A.S., Klimov, V.V., Kuzin, M.V., Shchukin, B.A.: Payment card fraud detection using neural network committee and clustering. Opt. Mem. Neural Netw. 24(3), 193–200 (2015)
Van Vlasselaer, V., Bravo, C., Caelen, O., Eliassi-Rad, T., Akoglu, L., Snoeck, M., Baesens, B.: APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions. Decis. Support. Syst. 75, 38–48 (2015)
Khan, A.U.S., Akhtar, N., Qureshi, M.N.: Real-time credit-card fraud detection using artificial neural network tuned by simulated annealing algorithm. In: Proceedings of International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 113–121. (2014)
Behera, T.K., Panigrahi, S.: Credit card fraud detection: a hybrid approach using fuzzy clustering & neural network. In: Second International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 494–499. (2015)
Halvaiee, N.S., Akbari, M.K.: A novel model for credit card fraud detection using Artificial Immune Systems. Appl. Soft Comput. 24, 40–49 (2014)
Soltani, N., Akbari, M.K., Javan, M.S.: A new user-based model for credit card fraud detection based on artificial immune system. In: 16th IEEE CSI International Symposium on Artificial Intelligence and Signal Processing, pp. 029–033. (2012)
Assis, C.A., Pereira,A., Pereira, M.A., Carrano, E.G.: A genetic programming approach for fraud detection in electronic transactions. In: IEEE Symposium on Computational Intelligence in Cyber Security, pp. 1–8. (2014)
RamaKalyani, K., UmaDevi, D.: Fraud detection of credit card payment system by genetic algorithm. Int. J. Sci. & Eng. Res. 3(7), 1–6 (2012)
Kennedy, E., Millard, C.: Data security and multi-factor authentication: Analysis of requirements under EU law and in selected EU Member States. Comput. Law & Secur. Rev. 32(1), 91–110 (2016)
Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smart phones. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1285–1292. (2012)
Aloul, F. A., Zahidi, S., El-Hajj, W.: Two factor authentication using mobile phones. In: IEEE Conference on Computer Systems and Applications, pp. 641–644. (2009)
www.eMarketer.com: https://apsalar.com/2016/03/mobile-and-smartphone-usage-statistics-for-india/. Accessed on June 2018
Acknowledgments
We extend our gratitude toward the Integral University for acknowledging our research work and providing us with Manuscript Communication Number-IU/R&D/2018-MCN000407. We also extend the same toward the Shri Ramswaroop Memorial University for giving us financial support for our research work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khattri, V., Nayak, S.K., Singh, D.K. (2020). An Enhanced Authentication Technique to Mitigate the Online Transaction Fraud. In: Choudhury, S., Mishra, R., Mishra, R., Kumar, A. (eds) Intelligent Communication, Control and Devices. Advances in Intelligent Systems and Computing, vol 989. Springer, Singapore. https://doi.org/10.1007/978-981-13-8618-3_14
Download citation
DOI: https://doi.org/10.1007/978-981-13-8618-3_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8617-6
Online ISBN: 978-981-13-8618-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)