scholarly journals Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures

2020 ◽  
Vol 12 (10) ◽  
pp. 160
Author(s):  
Guma Ali ◽  
Mussa Ally Dida ◽  
Anael Elikana Sam

The proliferation of digital financial innovations like mobile money has led to the rise in mobile subscriptions and transactions. It has also increased the security challenges associated with the current two-factor authentication (2FA) scheme for mobile money due to the high demand. This review paper aims to determine the threat models in the 2FA scheme for mobile money. It also intends to identify the countermeasures to overcome the threat models. A comprehensive literature search was conducted from the Google Scholar and other leading scientific databases such as IEEE Xplore, MDPI, Emerald Insight, Hindawi, ACM, Elsevier, Springer, and Specific and International Journals, where 97 papers were reviewed that focused on the topic. Descriptive research papers and studies related to the theme were selected. Three reviewers extracted information independently on authentication, mobile money system architecture, mobile money access, the authentication scheme for mobile money, various attacks on the mobile money system (MMS), threat models in the 2FA scheme for mobile money, and countermeasures. Through literature analysis, it was found that the threat models in the 2FA scheme for mobile money were categorised into five, namely, attacks against privacy, attacks against authentication, attacks against confidentiality, attacks against integrity, and attacks against availability. The countermeasures include use of cryptographic functions (e.g., asymmetric encryption function, symmetric encryption function, and hash function) and personal identification (e.g., number-based and biometric-based countermeasures). This review study reveals that the current 2FA scheme for mobile money has security gaps that need to be addressed since it only uses a personal identification number (PIN) and a subscriber identity module (SIM) to authenticate users, which are susceptible to attacks. This work, therefore, will help mobile money service providers (MMSPs), decision-makers, and governments that wish to improve their current 2FA scheme for mobile money.

Information ◽  
2020 ◽  
Vol 11 (6) ◽  
pp. 309 ◽  
Author(s):  
Guma Ali ◽  
Mussa Ally Dida ◽  
Anael Elikana Sam

Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the usage and acceptance of mobile money has mostly been low due to security issues and challenges associated with the system. As a result, there is a need to carry out a survey to evaluate the key security issues associated with mobile money systems in Uganda. The study employed a descriptive research design, and stratified random sampling technique to group the population. Krejcie and Morgan’s formula was used to determine the sample size for the study. The collection of data was through the administration of structured questionnaires, where 741 were filled by registered mobile money (MM) users, 447 registered MM agents, and 52 mobile network operators’ (MNOs) IT officers of the mobile money service providers (MMSPs) in Uganda. The collected data were analyzed using RStudio software. Statistical techniques like descriptive analysis and Pearson Chi-Square test was used in data analysis and mean (M) > 3.0 and p-value < 0.05 were considered statistically significant. The findings revealed that the key security issues are identity theft, authentication attack, phishing attack, vishing attack, SMiShing attack, personal identification number (PIN) sharing, and agent-driven fraud. Based on these findings, the use of better access controls, customer awareness campaigns, agent training on acceptable practices, strict measures against fraudsters, high-value transaction monitoring by the service providers, developing a comprehensive legal document to run mobile money service, were some of the proposed mitigation measures. This study, therefore, provides a baseline survey to help MNO and the government that would wish to implement secure mobile money systems.


2020 ◽  
Vol 17 (5) ◽  
pp. 496-517
Author(s):  
Yangcheng Liu ◽  
Wei Liu ◽  
Jiaqi Wang ◽  
Yang Liu ◽  
Changlan Chen ◽  
...  

Patrinia scabiosaefolia Fisch. Trev. and Patrinia villosa (Thunb.) Juss, are two species of Patrinia recorded in the Chinese Pharmacopoeia with the same Chinese name “Baijiangcao” and similar therapeutic effect in traditional Chinese medicine. The present article is the first comprehensive review on the chemical composition and pharmacological activities of these herbs. In this review, data on chemical constituents and pharmacological profile of the two herbs are provided. This review discusses all the classes of the 223 compounds (phenylpropanoids, flavonoids, terpenes, saponins and volatile components, etc.) detected in the two herbs providing information on the current state of knowledge of the phytochemicals present in them. In the past three years, our research group has isolated and identified about more than 100 ingredients from the two herbs. Therefore, we published a systematic review of our research papers and studies on the two herbs were carried out using resources such as classic books about Chinese herbal medicine and scientific databases including Pubmed, Web of Science, SciFinder, CNKI. etc. The present review discusses the most thoroughly studied pharmacological activities (antioxidant, anti-inflammatory, immunomodulatory, antimicrobial, antitumor and antiviral activities) of the two herbs. This comprehensive review will be informative for scientists searching for new properties of these herbs and will be important and significant for the discovery of bioactive compounds from the two herbs and in complete utilization of Patrinia scabiosaefolia Fisch. ex Trev. and Patrinia villosa (Thunb.) Juss.


Nutrients ◽  
2018 ◽  
Vol 10 (11) ◽  
pp. 1592
Author(s):  
Willemijn de Bruin ◽  
Cherie Stayner ◽  
Michel Lange ◽  
Rachael Taylor

There is an urgent need for strategic approaches to address the high prevalence of obesity and diabetes in New Zealand. Such approaches rely strongly on input from multiple actors in the diabetes and obesity policy space. We conducted a social network analysis to identify influential actors involved with shaping public opinion and/or policy regarding obesity and diabetes in New Zealand. Our analysis revealed a diverse network of 272 individuals deemed influential by their peers. These individuals represented nine professional categories, particularly academics (34%), health service providers (22%), and government representatives (17%). The network included a total of 17 identified decision-makers. Relative capacity of professional categories to access these decision-makers was highest for representatives of the food and beverage industry (25%), compared with nongovernment organisations (9%) or academics (7%). We identified six distinct brokers, in academic (n = 4), government (n = 1), and nongovernmental (n = 1) positions, who could play a key role in improving communication and networking activities among all interest groups. Such actions should ultimately establish effective networks to foster evidence-based policy development to prevent and reduce the burden of diabetes and obesity.


Author(s):  
Miguel Angel Ortíz-Barrios ◽  
Dayana Milena Coba-Blanco ◽  
Juan-José Alfaro-Saíz ◽  
Daniela Stand-González

The COVID-19 pandemic has strongly affected the dynamics of Emergency Departments (EDs) worldwide and has accentuated the need for tackling different operational inefficiencies that decrease the quality of care provided to infected patients. The EDs continue to struggle against this outbreak by implementing strategies maximizing their performance within an uncertain healthcare environment. The efforts, however, have remained insufficient in view of the growing number of admissions and increased severity of the coronavirus disease. Therefore, the primary aim of this paper is to review the literature on process improvement interventions focused on increasing the ED response to the current COVID-19 outbreak to delineate future research lines based on the gaps detected in the practical scenario. Therefore, we applied the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to perform a review containing the research papers published between December 2019 and April 2021 using ISI Web of Science, Scopus, PubMed, IEEE, Google Scholar, and Science Direct databases. The articles were further classified taking into account the research domain, primary aim, journal, and publication year. A total of 65 papers disseminated in 51 journals were concluded to satisfy the inclusion criteria. Our review found that most applications have been directed towards predicting the health outcomes in COVID-19 patients through machine learning and data analytics techniques. In the overarching pandemic, healthcare decision makers are strongly recommended to integrate artificial intelligence techniques with approaches from the operations research (OR) and quality management domains to upgrade the ED performance under social-economic restrictions.


2021 ◽  
Vol 12 (1) ◽  
pp. 135-146
Author(s):  
E.A. Ejem ◽  
C.M. Uka ◽  
D.N. Dike ◽  
C.C. Ikeogu ◽  
C.C. Igboanusi ◽  
...  

Abstract This paper is focused on solving the evaluation and selection of 3PL’s by applying multi-criteria decision-making methods. Nigerian Breweries, Nigerian Bottling Company (NBC), AG Leventis, Kobo logistics, and Flour Mills of Nigeria (FMN) were understudied. The main criteria on which evaluation is based were established: Cost, Service level, Financial Capability, Reputation and Long-term relationship. A combination of two quantitative models was adopted in the study. Relevant data were collected through an oral interview with managers and key decision-makers at the companies. SWARA was first applied to the collated data to determine the relative weights of the criteria. Afterwards, the TOPSIS was applied to the weights developed using SWARA and on the performance of the selected service providers. After the analysis, the best service provider was identified as supplier 2 while the worst was supplier 5.


Author(s):  
Suryakanthi Tangirala ◽  
Samuel Nlondiwa

Mobile money is an electronic wallet service that allows users to store, send and receive money using their mobile phone. This research is an effort to find out the adoption and utilization of mobile money services in small sized enterprises located in Gaborone, Botswana. Inevitably, other aspects such as different types of transactions carried out using mobile money services in small business, customer’s perception on quality of mobile money service providers, impeding factors of mobile money adoption are also studied for wider understanding of the subject. The findings of the study show that small enterprises use mobile money services to carryout transactions but the level of adoption is not significant. The study revealed that transactional costs and connectivity issues are major barriers of adoption of mobile money services. In conclusion the study recommended that the service providers must improve the connectivity issues and reduce transaction charges in order to increase the utilization of mobile money services


2020 ◽  
Vol 24 (04) ◽  
pp. 781-790
Author(s):  
Gabriel Silva Santos ◽  
◽  
Maurício Brandão Vecchi ◽  
Maria Alice Santos Alves

Historically, Domestic pigeon (Columba livia domestica Gmelin,1789) (Columbiformes, Columbidae) breeders use the species to promotes race competitions which over the time could select traits to increase the flight performance and spatial orientation capabilities. Although the species has remarkable navigational abilities, it is possible that these birds sometimes become disoriented pushing the individuals to fly off-course and over distances larger than usual. Here we report a Domestic Pigeon ringed in the Canary Islands (Spain) observed in the Abrolhos Archipelago, eastern Brazil, and compiled similar events (N = 5) in the Southwest Atlantic Ocean coast. Our results indicate that these events are largely unnoticed in the scientific literature as most of them were found in non-scientific newspaper and academic conferences, thus, untraceable from scientific databases as Scopus and Google Scholar. As domestic pigeons are possible intermediate hosts of diseases, we encourage the creation of a systematized database of this kind of movements of these birds, including the profile of these vagrants and the circumstances in which these events occur, which can be a basis to be used for scientists and decision makers.


2014 ◽  
Author(s):  
Muhammad Subhan ◽  
Sabariah Yaakub ◽  
Ahmad Bashawir Abdul Ghani

This book addresses myriad of issues and challenges in the field of port, maritime and hinterland development in Southeast Asia from multidisciplinary perspectives.Instead of focusing on only certain aspects of the maritime discipline, the book presents a range of different viewpoint from business and management, historical development, geography, law, and others.Although the book is made in the form of an edited book, readers will benefit and gain knowledge on many important issues in the field of port, maritime and hinterland development in Southeast Asia. This book will also be beneficial to all parties in this area, including policy and decision makers, government officials, port authorities, port operators or terminal operators, maritime-related service providers such as freight forwarders in port, ship agents, navigation officers, customs brokers, stevedores and other port users, shippers, passengers, and carriers.This book is also catered for those involved in maritime research or students who take maritime subject, or to the public who are interested in maritime issues.The contributors of this book are experts from diverse backgrounds with extensive experience in the fields of port, maritime and hinterland development.This is because we believe that maritime studies are intertwined with many aspects of life from environmental management to disputes at the sea, which will affect the maritime trade industry.Hence, issues in this book are also various.However, the emphasis is on the development of port, maritime and hinterland sector in Southeast Asia.


Author(s):  
Hussain Al-Aqrabi ◽  
Lu Liu

The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud’s control.


Sign in / Sign up

Export Citation Format

Share Document