Inter Bank Fund Transfer in Distributed Network
#1

[attachment=14790]
Modern financial institutions have cashed in on the electronic business opportunities of the Internet by developing numerous payment systems to meet various payment service requirements. Advanced computer systems and telecommunications technology are being used to offer fast, convenient, and secure ways to conduct financial transactions at service and security levels that are hardly or never achieved by traditional payment systems. In this paper, we examine the function and operation flow of the electronic funds transfer process as well as its security control mechanism. To evaluate telecommunication and data security techniques, a standard-leading inter-bank payment system called the Society for Worldwide Inter-bank Financial Telecommunications System is introduced. Some important security features are investigated in detail.
Distributed Transaction Proxy EFT uses on-line transactions carried out on private networks to transfer funds; the bank plays the role of both payer and payee. Such transfers occur between a bank and its customers, or a bank and another bank. In contrast to a check payment, which requires several actual cryptographic processing days and manual efforts like signature verification, check sorting, and information capture, EFTs are same-day, almost instantaneous payments.
Distributed Transaction:
Some of the main risks involved in Swift may come from hackers, increased dependence of banks on IT, Open Technologies, and increased electronic access by customers. Attacks on the system are possible by the following means: (1) Readily available sophisticated hacking tools; (2) Packet/Address spoofing; (3) Stealth diagnostics; (4) Sniffers; (5)Sweepers; and (6) Backdoors
Proposed Security Model:
Lack of encryption between banks and regional processors present serious risks to the system as transmissions may be intercepted and modified or even deleted. Attackers may subsequently divert, redirect, or cancel funds transfers. One of the countermeasures is to use public key cryptography to ensure proper authentication and privacy stealing vulnerability and other required compensating controls to secure cryptographic keys. The RSA cipher is a revolutionary invention in the cryptography field. It enables ciphering without leaking private key information. It deploys the public key scheme to modify the key escrow mechanism to be used in SWIFT system offering the following features for the above stated
problems:
• Each bank owns its private key and public key, but different keys are used for authentication of different
transactions, and these keys are unknown to SWIFT as before.
• Provide bank-to-center authentication.
• Provide link-by-link encryption from end-to-end. Each bank has a securely stored private key and a public key. A SWIFT terminal generates a random number for every message transmitted as the end-to-end authentication session key, and encrypts this key with the receiver's public key. Using the same procedure to perform bank-to-center input sequence number authentication, it enables an operating center to verify the authenticity of the input sequence number from customer banks. The receiving bank to verify the output
sequence number from the operating center uses the same method. Let us name this as link-by-link authentication. Finally, link-by-link encryption can be performed using a uniquely generated session key for message encryption and encrypting the session key with the public key of the code at the other side of the link.
SOFTWARE REQUIREMENTS
OPERATING SYSTEM : Windows 2000.
Technology :.NET/J2EE
DATABASE : Oracle 8i.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: bsc results fund, global fund, mutal fund, inter bank fund transfer in distributed network net, project on route reservation in inter network, world fund management andt, electronic fund transfer act 1978,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  blood bank system project report tiger 13 13,952 15-07-2017, 03:07 PM
Last Post: jaseela123d
  Exploring the design space of social network-based Sybil defenses 1 916 15-02-2017, 02:55 PM
Last Post: jaseela123d
  Critical State-Based Filtering System for Securing SCADA Network Protocols 1 853 14-02-2017, 12:48 PM
Last Post: jaseela123d
  Web Based Blood Bank Management System project report maker 4 12,606 18-04-2015, 07:12 PM
Last Post: Guest
  Blood Bank Management System Using Unified Process Methodology seminar class 3 9,665 24-02-2015, 01:49 PM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,258 19-09-2014, 12:52 AM
Last Post: [email protected]
  ONLINE BLOOD BANK FULL REPORT computer topic 0 1,617 25-03-2014, 11:48 PM
Last Post: computer topic
  Developing a web application to transfer image and patient information project report maker 2 3,657 21-03-2014, 01:44 AM
Last Post: MichaelPn
  IEEE Project on Network Simulation using OMNeT++ 3.2 for M.Tech and B.Tech VickyBujju 3 3,035 03-06-2013, 11:13 AM
Last Post: computer topic
  Image Transfer Protocol for Internt project topics 3 2,272 26-03-2013, 07:42 PM
Last Post: vvk chary

Forum Jump: