2020
DOI: 10.3390/fi12100160
|View full text |Cite
|
Sign up to set email alerts
|

Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures

Abstract: The proliferation of digital financial innovations like mobile money has led to the rise in mobile subscriptions and transactions. It has also increased the security challenges associated with the current two-factor authentication (2FA) scheme for mobile money due to the high demand. This review paper aims to determine the threat models in the 2FA scheme for mobile money. It also intends to identify the countermeasures to overcome the threat models. A comprehensive literature search was conducted from the Goog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
79
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(79 citation statements)
references
References 70 publications
(305 reference statements)
0
79
0
Order By: Relevance
“…The implementation of a payment gateway in the system makes this service have a transaction authentication process as well as ease of data processing, where the monitoring process can be carried out in real-time, making it easier to confirm every incoming fund, make sales reports, and find out customer details. However, the security of the electronic payment system is also something that needs to be considered by applying multiple security methods [29], as well as considering factors related to its advantages and disadvantages when used [30]. In addition, the prototype that was built still only uses one e-wallet service where this limits the flexibility of users in the payment process for their transactions, as well as the trust of users who are still unfamiliar with the use of e-wallet in their transactions.…”
Section: Discussionmentioning
confidence: 99%
“…The implementation of a payment gateway in the system makes this service have a transaction authentication process as well as ease of data processing, where the monitoring process can be carried out in real-time, making it easier to confirm every incoming fund, make sales reports, and find out customer details. However, the security of the electronic payment system is also something that needs to be considered by applying multiple security methods [29], as well as considering factors related to its advantages and disadvantages when used [30]. In addition, the prototype that was built still only uses one e-wallet service where this limits the flexibility of users in the payment process for their transactions, as well as the trust of users who are still unfamiliar with the use of e-wallet in their transactions.…”
Section: Discussionmentioning
confidence: 99%
“…However, to date, there are no strong security controls to suit all mobile money authentication security challenges. However, the existing proposed algorithms, though promising, require more work because they are vulnerable to impersonation attacks; USSD technology vulnerabilities; replay attacks; spoofing attacks; Trojan horse attacks; bruteforce attacks; shoulder-surfing attacks; MITM attacks; insider attacks; identity theft; social engineering attacks; SIM-swapping attacks; malware attacks; agent-driven fraud; and privacy attacks [8,9,11,[22][23][24][25][26]. Therefore, there is a need to develop a secure and efficient multi-factor authentication algorithm for mobile money applications where mobile money subscribers are authenticated using a PIN, OTP, and biometric fingerprints.…”
Section: Problem Statementmentioning
confidence: 99%
“…A PIN in mobile money is a numeric password that can authenticate subscribers in an electronic transaction. The PINs used in mobile money authentications are often four or five digits [11]. The PIN value as a means of authentication depends entirely on its secrecy from the moment the PIN is created until entered into the system.…”
Section: Personal Identification Number (Pin)mentioning
confidence: 99%
See 1 more Smart Citation
“…Various attacks are included in this form of attacks, such as Trojan horse attack, phishing attack, social engineering attack, spoofing attacks, masquerade attack, replay attacks, and impersonation attack. An attacker assumes the identity of a legitimate user in an impersonation attack [76], [77], [70], [71], whereas entire communication is subjected to eavesdropping in replay attack before intercepting [78]. In a masquerade attack, the PIN and SIM card are acquired by the users.…”
Section: B Attacks Against Authenticationmentioning
confidence: 99%