Android Multifactor Authentication
Android Multifactor Authentication
IN AFFILIATION WITH
UNIVERSITY OF NIGERIA NSUKKA
TOPIC:
BY:
COURSE:
SUPERVISOR:
APRIL 2023
1
ABSTRACT
The proliferation of digital financial innovations like mobile money has led to the rise
in mobile subscriptions and transactions. It has also increased the security challenges
associated with the current two-factor authentication (2FA) scheme for mobile
money due to the high demand. This review paper aims to determine the threat
models in the 2FA scheme for mobile money. It also intends to identify the
countermeasures to overcome the threat models. A comprehensive literature search
was conducted from the Google Scholar and other leading scientific databases such as
IEEE Xplore, MDPI, Emerald Insight, Hindawi, ACM, Elsevier, Springer, and Specific
and International Journals, where 97 papers were reviewed that focused on the topic.
Descriptive research papers and studies related to the theme were selected. Three
reviewers extracted information independently on authentication, mobile money
system architecture, mobile money access, the authentication scheme for mobile
money, various attacks on the mobile money system (MMS), threat models in the 2FA
scheme for mobile money, and countermeasures. Through literature analysis, it was
found that the threat models in the 2FA scheme for mobile money were categorized
into five, namely, attacks against privacy, attacks against authentication, attacks
against confidentiality, attacks against integrity, and attacks against availability. The
countermeasures include use of cryptographic functions (e.g., asymmetric encryption
function, symmetric encryption function, and hash function) and personal
identification (e.g., number-based and biometric-based countermeasures). This
review study reveals that the current 2FA scheme for mobile money has security gaps
that need to be addressed since it only uses a personal identification number (PIN)
and a subscriber identity module (SIM) to authenticate users, which are susceptible
to attacks. This work, therefore, will help mobile money service providers (MMSPs),
decision-makers, and governments that wish to improve their current 2FA scheme for
mobile money.
1
INTRODUCTION
Authentication has been a part of digital life since MIT implemented a password
system on their shared-access computer in 1961. Today, authentication covers
virtually every interaction you can have on the internet. But up until 2010, the
security of most online services only extended as far as requiring an eight-character
traditional password. Since then, online spending has grown to over $1 trillion
annually in the U.S. alone (you don't have to spend much to get a top-tier 5G phone).
Along with the growth in spending has come a corresponding growth in identity theft
and stolen passwords. To stem the rising tide of online crime and prevent
cybercriminals from taking your money, many banks and online retail stores demand
more than a password for account access. If you want to participate in today's online
marketplaces, you'll need multi-factor authentication.
Authentication is proving you are who you are: your authenticity. A factor of
authentication is a general method of authentication. Multi-factor authentication is
using more than one method to prove your identity. Generally, most security
systems use a combination of two or more factors of authentication.
2
Many websites (especially social media) use two knowledge factors to verify your
identity if you forget your password: your email address and the answer to one or
more security questions like "What street did you grow up on?" This is known as two-
step verification rather than two-factor authentication because even though two
questions are asked, the second factor of authentication isn't different from the first.
3
Behavior factors are something you do
4
digit passcode that changes at fixed intervals. The user has to append the OTP to their
login credentials to access their account.
It is estimated that the cost of cyber attacks in the banking sector has increased
dramatically, reaching 15.4 million Euros per firm yearly. Protecting the assets of the
consumer is the main goal of cyber security in digital banking. More and more
activities or transactions are being done online as more and more businesses are
going cashless. Cybercrimes in digital banking have an impact on both the customer
and the banks. Banks have to invest a substantial sum of money and resources in
order to be able to recover data. Along with that banks also lose their customer’s trust
when such issues arise.
Cybersecurity Threats
5
WHY IS MFA REQUIRED FOR BANKS AND FINANCIAL INSTITUTIONS?
The biggest drawback of using the traditional user ID and password logins is that the
passwords can be easily stolen by hackers which can cause millions of dollars in
damages. Brute-force cyberattacks are a serious concern since cybercriminals can use
automated password cracking tools to try different login and password combinations
until they discover the proper combination.
As more of the world's business moves online and the sophistication of hackers
continue to grow, the need for security will grow along with it. Given that over two
billion passwords were compromised in 2021 (a number that has been growing since
we began keeping count), using a simple password is no longer sufficient to lock
down sensitive data like medical records and credit card information. From where we
stand now, the future of online authentication looks like it will be shaped by two
paradigms: passwordless authentication and passive authentication.
6
In the future, public-key encryption will likely supplant passwords, verification codes,
and OTPs for most services. Instead of relying on an easily compromised knowledge
factor to keep your PayPal account safe, your private encryption key will be stored on
a possession factor like your mobile phone or a key fob, which will be locked behind
an inherence factor like your fingerprint or a face scan.
If security professionals don't like passwords, users don't like logging in or onerous
login requirements. Soon, you likely won't realize you're authenticating yourself as
more businesses adopt passive authentication schemes that rely on behavioral and
physical biometrics. Instead of logging in to your computer after it goes into sleep
mode, your computer will analyze your typing rhythm and perform periodic face
scans to authenticate you continuously.
CONCLUSION
MFA is needed for banks to protect against various online threats, such as phishing
attacks, account takeovers and several others. In this digital age, it is more important
than ever to have the proper security measures in place to protect your business and
customers. MFA is one of the most effective ways to protect your organization from
cybercrime.
REFERENCE
www.androidpolice.com
https://blog.miniorange.com
www.researchgate.net/publication/344366463_Two-
Factor_Authentication_Scheme_for_Mobile_Money_A_Review_of_Threat_Models
_and_Countermeasures