• Login
    View Item 
    •   NM-AIST Home
    • Computational and Communication Science Engineering
    • Research Articles [CoCSE]
    • View Item
    •   NM-AIST Home
    • Computational and Communication Science Engineering
    • Research Articles [CoCSE]
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications

    Thumbnail
    View/Open
    Full text (8.909Mb)
    Date
    2021-11-25
    Author
    Ali, Guma
    Dida, Mussa
    Sam, Anael
    Metadata
    Show full item record
    Abstract
    With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) that uses a standard public key cryptography technique (RSA), and Fernet encryption to secure a QR code and the records in the databases. The evolutionary prototyping model was adopted when developing the native mobile money application prototypes to prove that the algorithm is feasible and provides a higher degree of security. The developed applications were tested, and a detailed security analysis was conducted. The results show that the proposed algorithm is secure, efficient, and highly effective against the various threat models. It also offers secure and efficient authentication and ensures data confidentiality, integrity, non-repudiation, user anonymity, and privacy. The performance analysis indicates that it achieves better overall performance compared with the existing mobile money systems.
    URI
    https://doi.org/10.3390/fi13120299
    https://dspace.nm-aist.ac.tz/handle/20.500.12479/1404
    Collections
    • Research Articles [CoCSE]

    Nelson Mandela-AIST copyright © 2021  DuraSpace
    Theme by 
    Atmire NV
     

     

    Browse

    All PublicationsCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Nelson Mandela-AIST copyright © 2021  DuraSpace
    Theme by 
    Atmire NV