Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures

被引:18
作者
Ali, Guma [1 ]
Ally Dida, Mussa [1 ]
Elikana Sam, Anael [2 ]
机构
[1] Nelson Mandela African Inst Sci & Technol, Dept Informat Technol Dev & Management, Arusha 447, Tanzania
[2] Nelson Mandela African Inst Sci & Technol, Dept Commun Sci & Engn CoSE, Arusha 447, Tanzania
关键词
two-factor; authentication scheme; authentication; mobile money; the mobile money system; mobile banking; threat models; countermeasures; SECURITY;
D O I
10.3390/fi12100160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of digital financial innovations like mobile money has led to the rise in mobile subscriptions and transactions. It has also increased the security challenges associated with the current two-factor authentication (2FA) scheme for mobile money due to the high demand. This review paper aims to determine the threat models in the 2FA scheme for mobile money. It also intends to identify the countermeasures to overcome the threat models. A comprehensive literature search was conducted from the Google Scholar and other leading scientific databases such as IEEE Xplore, MDPI, Emerald Insight, Hindawi, ACM, Elsevier, Springer, and Specific and International Journals, where 97 papers were reviewed that focused on the topic. Descriptive research papers and studies related to the theme were selected. Three reviewers extracted information independently on authentication, mobile money system architecture, mobile money access, the authentication scheme for mobile money, various attacks on the mobile money system (MMS), threat models in the 2FA scheme for mobile money, and countermeasures. Through literature analysis, it was found that the threat models in the 2FA scheme for mobile money were categorised into five, namely, attacks against privacy, attacks against authentication, attacks against confidentiality, attacks against integrity, and attacks against availability. The countermeasures include use of cryptographic functions (e.g., asymmetric encryption function, symmetric encryption function, and hash function) and personal identification (e.g., number-based and biometric-based countermeasures). This review study reveals that the current 2FA scheme for mobile money has security gaps that need to be addressed since it only uses a personal identification number (PIN) and a subscriber identity module (SIM) to authenticate users, which are susceptible to attacks. This work, therefore, will help mobile money service providers (MMSPs), decision-makers, and governments that wish to improve their current 2FA scheme for mobile money.
引用
收藏
页码:1 / 27
页数:27
相关论文
共 119 条
[1]  
Ahsan K, 2016, INT J ADV SCI ENG TE, V4, P17
[2]   Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model [J].
Airehrour, David ;
Nair, Nisha Vasudevan ;
Madanian, Samaneh .
INFORMATION, 2018, 9 (05)
[3]   Control of fraud on mobile money services in Ghana: an exploratory study [J].
Akomea-Frimpong, Isaac ;
Andoh, Charles ;
Akomea-Frimpong, Agnes ;
Dwomoh-Okudzeto, Yvonne .
JOURNAL OF MONEY LAUNDERING CONTROL, 2019, 22 (02) :300-317
[4]   Phishing environments, techniques, and countermeasures: A survey [J].
Aleroud, Ahmed ;
Zhou, Lina .
COMPUTERS & SECURITY, 2017, 68 :160-196
[5]  
Alhassan N.S., 2018, P 5 INT C COMP SUST, P4639
[6]  
Alhothailya A., 2017, P INT C ID INF KNOWL, P426
[7]   Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda [J].
Ali, Guma ;
Dida, Mussa Ally ;
Sam, Anael Elikana .
INFORMATION, 2020, 11 (06)
[8]  
Alornyo Seth, 2019, 2019 International Conference on Cyber Security and Internet of Things (ICSIoT). Proceedings, P82, DOI 10.1109/ICSIoT47925.2019.00021
[9]   Two Factor Authentication Using Mobile Phones [J].
Aloul, Fadi ;
Zahidi, Syed ;
El-Hajj, Wassim .
2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, :641-+
[10]  
Altwairqi A.F., 2019, Int. J. Eng. Adv. Technol. IJEAT, V9, P2131