Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Development of a secure multi-factor authentication algorithm for mobile money applications

View through CrossRef
With the evolution of industry 4.0, financial technologies have become paramount and mobile money as one of the financial technologies has immensely contributed to improving financial inclusion among the unbanked population. Several mobile money schemes were developed but, they suffered severe authentication security challenges since they implemented two-factor authentication. This study focused on developing a secure multi-factor authentication (MFA) algorithm for mobile money applications. It uses personal identification numbers, one-time passwords, biometric fingerprints, and quick response codes to authenticate and authorize mobile money subscribers. Secure hash algorithm-256, Rivest-Shamir-Adleman encryption, and Fernet encryption were used to secure the authentication factors, confidential financial information and data before transmission to the remote databases. A literature review, survey, evolutionary prototyping model, and heuristic evaluation and usability testing methods were used to identify authentication issues, develop prototypes of native genuine mobile money (G-MoMo) applications, and identify usability issues with the interface designs and ascertain their usability, respectively. The results of the review grouped the threat models into attacks against privacy, authentication, confidentiality, integrity, and availability. The survey identified authentication attacks, identity theft, phishing attacks, and PIN sharing as the key mobile money systems’ security issues. The researcher designed a secure MFA algorithm for mobile money applications and developed three native G-MoMo applications to implement the designed algorithm to prove the feasibility of the algorithm and that it provided robust security. The algorithm was resilient to non-repudiation, ensured strong authentication security, data confidentiality, integrity, privacy, and user anonymity, was highly effective against several attacks but had high communication overhead and computational costs. Nevertheless, the heuristic evaluation results showed that the G-MoMo applications’ interface designs lacked forward navigation buttons, uniformity in the applications’ menu titles, search fields, actions needed for recovery, and help and documentation. Similarly, the usability testing revealed that they were easy to learn, effective, efficient, memorable, with few errors, subscriber satisfaction, easy to use, aesthetic, easy to integrate, and understandable. Implementing a secure mobile money authentication and authorisation by combining multiple factors which are securely stored helps mobile money subscribers and other stakeholders to have trust in the developed native G-MoMo applications.
The Nelson Mandela African Institution of Science and Technology
Title: Development of a secure multi-factor authentication algorithm for mobile money applications
Description:
With the evolution of industry 4.
0, financial technologies have become paramount and mobile money as one of the financial technologies has immensely contributed to improving financial inclusion among the unbanked population.
Several mobile money schemes were developed but, they suffered severe authentication security challenges since they implemented two-factor authentication.
This study focused on developing a secure multi-factor authentication (MFA) algorithm for mobile money applications.
It uses personal identification numbers, one-time passwords, biometric fingerprints, and quick response codes to authenticate and authorize mobile money subscribers.
Secure hash algorithm-256, Rivest-Shamir-Adleman encryption, and Fernet encryption were used to secure the authentication factors, confidential financial information and data before transmission to the remote databases.
A literature review, survey, evolutionary prototyping model, and heuristic evaluation and usability testing methods were used to identify authentication issues, develop prototypes of native genuine mobile money (G-MoMo) applications, and identify usability issues with the interface designs and ascertain their usability, respectively.
The results of the review grouped the threat models into attacks against privacy, authentication, confidentiality, integrity, and availability.
The survey identified authentication attacks, identity theft, phishing attacks, and PIN sharing as the key mobile money systems’ security issues.
The researcher designed a secure MFA algorithm for mobile money applications and developed three native G-MoMo applications to implement the designed algorithm to prove the feasibility of the algorithm and that it provided robust security.
The algorithm was resilient to non-repudiation, ensured strong authentication security, data confidentiality, integrity, privacy, and user anonymity, was highly effective against several attacks but had high communication overhead and computational costs.
Nevertheless, the heuristic evaluation results showed that the G-MoMo applications’ interface designs lacked forward navigation buttons, uniformity in the applications’ menu titles, search fields, actions needed for recovery, and help and documentation.
Similarly, the usability testing revealed that they were easy to learn, effective, efficient, memorable, with few errors, subscriber satisfaction, easy to use, aesthetic, easy to integrate, and understandable.
Implementing a secure mobile money authentication and authorisation by combining multiple factors which are securely stored helps mobile money subscribers and other stakeholders to have trust in the developed native G-MoMo applications.

Related Results

Development of a secure multi-factor authentication algorithm for mobile money applications
Development of a secure multi-factor authentication algorithm for mobile money applications
With the evolution of industry 4.0, financial technologies have become paramount and mobile money as one of the financial technologies has immensely contributed to improving financ...
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
PurposeMobile technologies offer the opportunity to embed learning in a natural environment. The objective of the study is to examine how the usage of mobile phones for m‐learning ...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
TINJAUAN HUKUM ISLAM TERHADAP PENGGUNAAN E-MONEY PADA BANK MANDIRI CABANG BULUKUMBA
TINJAUAN HUKUM ISLAM TERHADAP PENGGUNAAN E-MONEY PADA BANK MANDIRI CABANG BULUKUMBA
Abstrak E-Money atau Uang elektronik didefenisikan sebagai alat pembayaran dalam bentuk uang elektronik dimana nilai uangnya disimpan dalam media elektronik tertentu. Pokok masala...
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
A NOVEL APPROACH FOR MOBILE WALLET SECURITY AND MONEY ASSOCIATE’S SECURITY
 Mobile money refers to performing monetary transactions using telecommunications networks. This activity is intended to be referred to as "mobile money." The rapid use of mobile m...
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Attribute-based multiuser authentication scheme between IoT devices for 5G environment
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively ...
Mobile Money Landscape in the 12 SADC Countries using FinScope Survey Data
Mobile Money Landscape in the 12 SADC Countries using FinScope Survey Data
There is no doubt that mobile money is bringing the under-served and the excluded population into the main stream financial services corridors. Based on the FinScope surveys, mobil...
ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...

Back to Top