Vulnerability of the Dynamic Array PIN Protocol

dc.contributor.authorSamir Chabbi
dc.contributor.authorDjalel Chefrour
dc.date.accessioned2024-03-29T14:28:26Z
dc.date.available2024-03-29T14:28:26Z
dc.date.issued2022-02-28
dc.description.abstractWe recently proposed the Dynamic Array PIN protocol (DAP), which is a novel approach for user authentication on Automated Teller Machines. DAP replaces bank cards with smartphones that support Near Field Communication (NFC) and allows a user to enter his PIN code in a secure way. We showed that DAP is resistant to 13 different attacks and is therefore better and more cost effective than several other solutions from the literature. However, after carrying a deeper analysis we found that DAP is vulnerable to a complex attack that might lead to unauthorized transactions on ATMs if the user smartphone and his PIN code are both stolen. In this paper we expose how the user PIN code can be discretely discovered using multiple eavesdropping videos or camera records. We also propose several fixes for this vulnerability.
dc.identifier.citationChabbi, S., Chefrour, D. (2022). Vulnerability of the dynamic array PIN protocol. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, pp. 41-47. https://doi.org/10.18280/isi.270105
dc.identifier.urihttps://dspace.univ-soukahras.dz/handle/123456789/3590
dc.language.isoen_US
dc.publisherIngénierie des Systèmes d’Information
dc.relation.ispartofseries27; 1
dc.titleVulnerability of the Dynamic Array PIN Protocol
dc.typeArticle
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2022-489-9f245.pdf
Size:
1.29 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description:
Collections