scholarly journals A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications

2021 ◽  
Vol 13 (12) ◽  
pp. 299
Author(s):  
Guma Ali ◽  
Mussa Ally Dida ◽  
Anael Elikana Sam

With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication (2FA) as the only means of verifying mobile money users. These 2FA schemes are vulnerable to numerous security attacks because they only use a personal identification number (PIN) and subscriber identity module (SIM). This study aims to develop a secure and efficient multi-factor authentication algorithm for mobile money applications. It uses a novel approach combining PIN, a one-time password (OTP), and a biometric fingerprint to enforce extra security during mobile money authentication. It also uses a biometric fingerprint and quick response (QR) code to confirm mobile money withdrawal. The security of the PIN and OTP is enforced by using secure hashing algorithm-256 (SHA-256), a biometric fingerprint by Fast IDentity Online (FIDO) that uses a standard public key cryptography technique (RSA), and Fernet encryption to secure a QR code and the records in the databases. The evolutionary prototyping model was adopted when developing the native mobile money application prototypes to prove that the algorithm is feasible and provides a higher degree of security. The developed applications were tested, and a detailed security analysis was conducted. The results show that the proposed algorithm is secure, efficient, and highly effective against the various threat models. It also offers secure and efficient authentication and ensures data confidentiality, integrity, non-repudiation, user anonymity, and privacy. The performance analysis indicates that it achieves better overall performance compared with the existing mobile money systems.

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Matthias Suter ◽  
Olivier Huguenin-Elie ◽  
Andreas Lüscher

AbstractAssessing the overall performance of ecosystems requires a quantitative evaluation of multifunctionality. We investigated plant species diversity effects on individual functions and overall multifunctionality in a grassland experiment with sown monocultures and mixtures comprising four key grass and legume species. Nitrogen fertilisation rates were 50, 150, and 450 kg N ha−1 yr−1 (N50, N150, N450). Ten functions were measured representing forage production, N cycling, and forage quality, all being related to either productivity or environmental footprint. Multifunctionality was analysed by a novel approach using the mean log response ratio across functions. Over three experimental years, mixture effects benefited all forage production and N cycling functions, while sustaining high forage quality. Thus, mixture effects did not provoke any trade-off among the analysed functions. High N fertilisation rates generally diminished mixture benefits. Multifunctionality of four-species mixtures was considerably enhanced, and mixture overall performance was up to 1.9 (N50), 1.8 (N150), and 1.6 times (N450) higher than in averaged monocultures. Multifunctionality of four-species mixtures at N50 was at least as high as in grass monocultures at N450. Sown grass–legume mixtures combining few complementary species at low to moderate N fertilisation sustain high multifunctionality and are a ‘ready-to-use’ option for the sustainable intensification of agriculture.


2007 ◽  
Vol 28 (2) ◽  
pp. 302-311 ◽  
Author(s):  
Xianren Wu ◽  
Tomas Drabek ◽  
Samuel A Tisherman ◽  
Jeremy Henchir ◽  
S William Stezoski ◽  
...  

We have used a rapid induction of profound hypothermia (> 10°C) with delayed resuscitation using cardiopulmonary bypass (CPB) as a novel approach for resuscitation from exsanguination cardiac arrest (ExCA). We have defined this approach as emergency preservation and resuscitation (EPR). We observed that 2 h but not 3 h of preservation could be achieved with favorable outcome using ice-cold normal saline flush to induce profound hypothermia. We tested the hypothesis that adding energy substrates to saline during induction of EPR would allow intact recovery after 3 h CA. Dogs underwent rapid ExCA. Two minutes after CA, EPR was induced with arterial ice-cold flush. Four treatments ( n = 6/group) were defined by a flush solution with or without 2.5% glucose (G + or G–) and with either oxygen or nitrogen (O + or O–) rapidly targeting tympanic temperature of 8°C. At 3 h after CA onset, delayed resuscitation was initiated with CPB, followed by intensive care to 72 h. At 72 h, all dogs in the O + G + group regained consciousness, and the group had better neurological deficit scores and overall performance categories than the O—groups (both P < 0.05). In the O + G—group, four of the six dogs regained consciousness. All but one dog in the O—groups remained comatose. Brain histopathology in the O—G + was worse than the other three groups ( P < 0.05). We conclude that EPR induced with a flush solution containing oxygen and glucose allowed satisfactory recovery of neurological function after a 3 h of CA, suggesting benefit from substrate delivery during induction or maintenance of a profound hypothermic CA.


2019 ◽  
Vol 16 (9) ◽  
pp. 3945-3954
Author(s):  
Priya Oberoi ◽  
Sumit Mittal ◽  
Rajneesh Kumar Gujral

Cloud security is one of the major issues which are affecting the acceptance of Cloud computing (CC). In spite of the number of benefits offered by CC, it also suffers from a myriad of security vulnerabilities. Security is the prime concern while we are accessing the resources from the Cloud through the Internet. This research work is primarily on IAAS (Infrastructure as a service). Here a protocol called Authenticated Routing on Cloud Network (ARCN) has been proposed, to secure the communication route between the client and service provider. The proposed protocol ARCN uses the public key cryptography to mitigate the various security attacks like malicious insider attacks, Spoofing, Falsified routes, DoS, etc.


2010 ◽  
Vol 20-23 ◽  
pp. 849-855 ◽  
Author(s):  
Yuan Quan Shi ◽  
Tao Li ◽  
Wen Chen ◽  
Rui Rui Zhang

To effectively prevent large-scale network security attacks, a novel Predication Approach for Network Security Situation inspired by Immunity (PANSSI) is proposed. In this predication approach, the concepts and formal definitions of antigen and antibody in the network security situation predication domain are given; meanwhile, the mathematical models of some antibody evolution operators being related to PANSSI are exhibited. By analyzing time series and computing the affinity between antigen and antibody in artificial immune system, network security situation predication model is established, and then the future situation of network security attacks is predicted by it. Experimental results prove that PANSSI can forecast the future network security situation real-timely and correctly, and provides a novel approach for network security situation predication.


Author(s):  
Mushtaq Hasson ◽  
Ali A. Yassin ◽  
Abdulla J. Yassin ◽  
Abdullah Mohammed Rashid ◽  
Aqeel A. Yaseen ◽  
...  

As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-go service. Security is represented one of the vital issues for the extended adoption of cloud computing, with the object of accessing several cloud service providers, applications, and services by using anonymity features to authenticate the user. We present a good authentication scheme based on quick response (QR) code and smart card. Furthermore, our proposed scheme has several crucial merits such as key management, mutual authentication, one-time password, user anonymity, freely chosen password, secure password changes, and revocation by using QR code. The security of proposed scheme depends on crypto-hash function, QR-code validation, and smart card. Moreover, we view that our proposed scheme can resist numerous malicious attacks and are more appropriate for practical applications than other previous works. The proposed scheme has proved as a strong mutual authentication based on burrows-abadi-needham (BAN) logic and security analysis. Furthermore, our proposed scheme has good results compared with related work.


Sign in / Sign up

Export Citation Format

Share Document