IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 7 - Issue 3, March 2018 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Robust And Scalable Four Factor Authentication Architecture To Enhance Security For Mobile Online Transaction

[Full Text]

 

AUTHOR(S)

Elliot Mbunge, Talent Rugube

 

KEYWORDS

Authorization, multifactor authentication, online transaction

 

ABSTRACT

This paper was focusing on the designing of a robust and scalable four factor authentication architecture to enhance security for electronic transactions. Mobile device are vulnerable to several security threats especially when purchasing good and services online. Currently, some banking institutions and e-commerce websites use two factor authentication to verify and validate customers when making online payments. Two factor authentication is regarded as the weakest authentication method. Mobile devices users are vulnerable to online mobile fraudulent activities due to several factors. The researchers designed a four factor security architecture to mitigate security threats because security is vital when making online transactions.

 

REFERENCES

[1] Anil, J., Jianjiang, F. & Karthik, N., 2010. FINGERPRINT Matching. [Online] Available at: HYPERLINK "http://biometrics.cse.msu.edu/Publications/Fingerprint/JainFpMatching_IEEEComp10.pdf" http://biometrics.cse.msu.edu/Publications/Fingerprint/JainFpMatching_IEEEComp10.pdf [Accessed 20 February 2018].

[2] Ashish, W., Rugved, M. & Ashlesha, G., 2013. Mobile Commerce and Related Mobile Security Issues. International Journal of Engineering Trends and Technology (IJETT), 4(4).

[3] Asif, A., Israr, u.H. & Monisa, N., 2017. TWO FACTOR AUTHENTICATION. International Journal of Computer Science and Mobile Computing, 6(7), pp.5-8.

[4] Debnath, B., Rahul, R., Farkhod, A. & Minkyu, C., 2009. Biometric Authentication: A Review. nternational Journal of u- and e- Service, Science and Technology , 2(3).

[5] Deepak, K. & Nivesh, G., 2016. Security Issues in M-Commerce for Online Transaction. ieeexplore.ieee, pp.2-5.

[6] Deepak, K. & Nivesh, G., 2016. Security Issues in M-Commerce for Online Transaction. [Online] Available at: HYPERLINK "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7784990" http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7784990 [Accessed 07 February 2018].

[7] Dimensional Research , 2013. THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS. [Online] Available at: HYPERLINK "https://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report.pdf" https://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report.pdf [Accessed 07 February 2017].

[8] Elliot, M., Ralph, M., Nation, C. & Antony, C., 2017. Fraud Detection in E-Transactions using Deep Neural Networks - A Case of Financial Institutions in Zimbabwe. International Journal of Science and Research (IJSR), 6(9), pp.1036 - 1041.

[9] Fadi, A., Syed, Z. & Wassim, E.-H., 2009. Multi Factor Authentication Using Mobile Phones. International Journal of Applied Mathematics and Computer Science , pp.6580.

[10] Federico, M., Simone, G. & Giacomo, B., 2016. A Fast Eavesdropping Attack Against Touchscreens. [Online] Available at: HYPERLINK "http://www.syssec-project.eu/m/page-media/3/iclearshot-ias11.pdf" http://www.syssec-project.eu/m/page-media/3/iclearshot-ias11.pdf [Accessed 07 February 2018].

[11] Joel, D., 2005. How to secure session tokens. [Online] Available at: HYPERLINK "http://searchsecurity.techtarget.com/tip/How-to-secure-session-tokens" http://searchsecurity.techtarget.com/tip/How-to-secure-session-tokens [Accessed 20 February 2018].

[12] Justin, S., 2018. Mobile eCommerce Stats in 2018 and the Future Trends of mCommerce. [Online] Available at: HYPERLINK "https://www.outerboxdesign.com/web-design-articles/mobile-ecommerce-statistics" https://www.outerboxdesign.com/web-design-articles/mobile-ecommerce-statistics [Accessed 06 February 2018].

[13] Karthick & Sumitra, B., 2017. Android security issues and solutions. IEEE Xplore.

[14] Lucas, M., 2017. Android vs iOS security: Which is better? [Online] Available at: HYPERLINK "https://www.computerworld.com/article/3213388/mobile-wireless/android-vs-ios-security-which-is-better.html" https://www.computerworld.com/article/3213388/mobile-wireless/android-vs-ios-security-which-is-better.html [Accessed 07 February 2018].

[15] Manav, S. & Shashikala, T., 2012. Software Tokens Based Two Factor Authentication Scheme. International Journal of Information and Electronics Engineering, 2(3).

[16] Marc, S. et al., 2017. The first collision for full SHA-1. [Online] Available at: HYPERLINK "https://shattered.io/static/shattered.pdf" https://shattered.io/static/shattered.pdf [Accessed 21 February 2018].

[17] Mohan, P. & Anuradha, 2015. Network Security and Types of Attacks in Network. In International Conference on Intelligent Computing, Communication & Convergence. India, 2015. ScienceDirect.

[18] Rani, M., 2018. For the first time, more people will do their holiday shopping on mobile than on desktop. [Online] Available at: HYPERLINK "https://www.recode.net/2017/11/2/16582034/holiday-shopping-mobile-desktop-online-revenue-retail" https://www.recode.net/2017/11/2/16582034/holiday-shopping-mobile-desktop-online-revenue-retail [Accessed 06 February 2018].

[19] Renu, B., 2013. Biometrics and Face Recognition Techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), pp.93-99.

[20] Russell, B., 2017. TWO-FACTOR AUTHENTICATION IS A MESS. [Online] Available at: HYPERLINK "https://www.theverge.com/2017/7/10/15946642/two-factor-authentication-online-security-mess" https://www.theverge.com/2017/7/10/15946642/two-factor-authentication-online-security-mess [Accessed 20 February 2018].

[21] Statista, 2017. E-commerce worldwide. [Online] Available at: HYPERLINK "https://www.statista.com/topics/871/online-shopping/" https://www.statista.com/topics/871/online-shopping/ .

[22] Statista, 2018. Global mobile OS market share in sales to end users from 1st quarter 2009 to 2nd quarter 2017. [Online] Available at: HYPERLINK "https://www.statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/" https://www.statista.com/statistics/266136/global-market-share-held-by-smartphone-operating-systems/ [Accessed 07 February 2018].

[23] Tim, G., 2016. Startup touts four-factor authentication for VIP-level access. [Online] Available at: HYPERLINK "https://www.networkworld.com/article/3036293/security/startup-touts-four-factor-authentication-for-vip-level-access.html" https://www.networkworld.com/article/3036293/security/startup-touts-four-factor-authentication-for-vip-level-access.html [Accessed 06 February 2018].

[24] Usman, J.W. & Akintoye, O.O., 2014. MOBILE COMMERCE AND SECURITY ISSUES. International Journal of Scientific Research Engineering & Technology, 3(4), pp.1-6.

[25] Vaclav, M.J. & Zdenek, R., n.d. Biometric Authentication Systems. [Online] Available at: HYPERLINK "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.24.3840&rep=rep1&type=pdf" http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.24.3840&rep=rep1&type=pdf [Accessed 20 February 2018].

[26] Vanaja, R. & Laxman, W., 2014. Iris Biometric Authentication used for Security Systems. Image, Graphics and Signal Processing, 9, pp.54-60.

[27] YoHan, P. et al., 2017. Security analysis and enhancements of an improved multi-factor biometric authentication scheme. International Journal of Distributed Sensor Networks, 13(8).