High Correctness Mobile Money Authentication System

Authors

  • Fouad Osman Malaysia-Japan International Institute of Technology (MJIIT), Author

DOI:

https://doi.org/10.61841/tecqem79

Keywords:

Mobile Money, Personal Identification Number,, Iris Biometric, Aliveness and Artifact Detection, , Imposter.

Abstract

Mobile money is a mobile embedded system that is used for money deposit, money withdrawer, items purchase, bills payment, airtime and internet recharges. The current mobile money authentication system uses personal identification number (PIN) that is feeble, vulnerable to shoulder surfers and susceptible to mobile money attackers. To solve this flaws of mobile money authentication system and to establish high correctness mobile money authentication system. A new mobile money authentication system is studied. Key aspects for high correctness of mobile money authentication system is to correctly accept real mobile money users and to properly reject mobile money non-users. To correctly evaluate the mobile money users by the authentication system, mobile money system should have functions to identify and verify the users and functions to authorize the transactions of the money. To detect the mobile money user, a unique identity number is registered during mobile money user enrolment. To verify the identity of the user and authorize transactions, iris biometric authentication system is proposed and added in to the mobile money system. Iris biometric system is the most secured, robustness and reliable authentication system. It is real time verification system that cannot change with age and have minimum accuracy error rate. Users can easily accept Iris biometric system as mobile money authentication system because mobile camera can take the eye- iris images. In this paper a high correctness mobile money authentication system is propose that is based on iris biometric system and unique user ID number. The paper also outlines qualitative approach, interviewed number of mobile money users from their point of view and perspectives about the proposed iris system. Results show that most of the interviewee are highly welcome security strength to mobile money, particularly iris authentication system. Finally the paper discuss future research opportunities and limitations of the study.

 

Downloads

Download data is not yet available.

References

[1] Akhtar, Z., Michelon, C., & Foresti, G. L. (2014). Liveness detection for biometric authentication in mobile applications. Paper presented at the Security Technology (ICCST), 2014 International Carnahan Conference on.

[2] Ali, S. A., Shah, M. A., Javed, T. A., Abdullah, S. M., & Zafar, M. (2017). Iris recognition system in smartphones using light version (LV) recognition algorithm. Paper presented at the Automation and Computing (ICAC), 2017 23rd International Conference on.

[3] Aron, J. (2017). ‘Leapfrogging’: a Survey of the Nature and Economic Implications of Mobile Money: Centre for the Study of African Economies, University of Oxford.

[4] B.Mtaho, A. (2015). Improving Mobile Money Security with Two-Factor Authentication (Vol. 109).

[5] Camner, G., Pulver, C., & Sjöblom, E. (2009). What makes a successful mobile money implementation? Learnings from M-PESA in Kenya and Tanzania. London: GMSA, available at: www. gsmworld. com/our- work/mobile_planet/mobile_money_for_the_unbanked/, accessed, 24, 2011.

[6] Chirchi, E. R. M., & Kharadkar, R. (2011). Improvement of Performance Evaluation for Iris Pattern Recognition. International Journal of Computer Applications, 34(6).

[7] Chong, M. K. (2006). Security of Mobile Banking:Secure SMS Banking.

[8] Dahlberg, T., Guo, J., & Ondrus, J. (2015). A critical review of mobile payment research. Electronic Commerce Research and Applications, 14(5), 265-284.

[9] De Jesús, R.-B. J., Máximo, L.-S., Raúl, P.-E., & Gabriel, G.-S. (2016). Methodology for Iris Scanning through Smartphones. Paper presented at the Computational Science and Computational Intelligence (CSCI), 2016 International Conference on.

[10] Divya, M., & Janani, A. Defending Shoulder Surfing Attacks in Secure Transactions Using Session Key Method. International Journal of Innovative Research in Science, Engineering and Technology, 4.

[11] Dobie, A. (2012). How to Tell If Your Samsung Phone is Vulnerable to Today's USSD Hack.

[12] Gaber, C., Gharout, S. ı., Achemlal, M., & Pasquet, a. M. ( 2012). Security challenges of mobile money transfer services.

[13] Galbally, J., Ross, A., Gomez-Barrero, M., Fierrez, J., & Ortega-Garcia, J. (2013). Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms. Computer Vision and Image Understanding, 117(10), 1512-1525.

[14] GSMA. (2017). State of the Industry Report on Mobile Money. from GSMA

[15] Guo, C., Wang, H. J., & Zhu, W. (2004). Smart-phone attacks and defenses. Paper presented at the hotnets III.

[16] Gupta, P., Behera, S., Vatsa, M., & Singh, R. (2014). On iris spoofing using print attack. Paper presented at the Pattern Recognition (ICPR), 2014 22nd International Conference on.

[17] Hogben, G., & Dekker, M. (2010). Smartphones: Information security risks, opportunities and recommendations for users. European Network and Information Security Agency, 710(01).

[18] Kohli, N., Yadav, D., Vatsa, M., Singh, R., & Noore, A. (2016). Detecting medley of iris spoofing attacks using DESIST. Paper presented at the Biometrics Theory, Applications and Systems (BTAS), 2016 IEEE 8th International Conference on.

[19] Kothari, C. R. (2004). Research methodology: Methods and techniques: New Age International.

[20] Miss. Priti V. Dable, P. P. R. L. a. M. S. S. K. (2016). Improving Iris Recognition Performance using Acquisition, Segmentation and filter. Paper presented at the International Journal on Recent and Innovation Trends in Computing and Communication

[21] Mtaho, A. B. (2015). Improving Mobile Money Security with Two-Factor Authentication. International Journal of Computer Applications, 109(7).

[22] Rajesh, T., Karnan, M., & Sivakumar, R. (2014). Performance Analysis of Iris Recognition System-A Review. International Journal of Computer Science & Information Technology, 39-50.

[23] Richardson, R., & Director, C. (2008). CSI computer crime and security survey. Computer Security Institute, 1, 1-30.

[24] Shah, N., & Shrinath, P. (2014). Iris Recognition System–A Review. International Journal of Computer and Information Technology, 3(02).

[25] Solanke, S. B., & Deshmukh, R. R. (2016). “Biometrics—Iris recognition system” A study of promising approaches for secured authentication. Paper presented at the Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on.

[26] Svajcer, V. (2014). Not Just for PCs Anymore: The Rise of Mobile Malware.

[27] Tania, U. T., Motakabber, S. M., & Ibrahimy, M. I. (2014). Template Matching Techniques for Iris Recognition System. Paper presented at the Computer and Communication Engineering (ICCCE), 2014 International Conference on.

[28] Vaishnavi, V., & Kuechler, W. (2004). Design research in information systems.

[29] Venugopalan, S., & Savvides, M. (2011). How to generate spoofed irises from an iris code template. IEEE Transactions on Information Forensics and Security, 6(2), 385-395.

[30] Vizzarri, A., & Vatalaro, F. (2014). m-Payment systems: Technologies and business models. Paper presented at the Euro Med Telco Conference (EMTC), 2014.

[31] Wahyuni, D. (2012). The research design maze: Understanding paradigms, cases, methods and methodologies.

[32] Walliman, N. (2017). Research methods: The basics: Routledge.

[33] Yanoff, M. (2014). Ophthalmic Diagnosis & Treatment: JP Medical Ltd.

Downloads

Published

30.06.2020

How to Cite

Osman, F. (2020). High Correctness Mobile Money Authentication System. International Journal of Psychosocial Rehabilitation, 24(4), 3544-3556. https://doi.org/10.61841/tecqem79