Skip to main content

Table 8 Supporting technology of authentication for secure transaction

From: Role of authentication factors in Fin-tech mobile transaction security

Refs.

Problems

Techniques

Challenges

Results

[12]

In insecure public communication networks, mobile payments

Mobile payments through certificate less cryptographic primitives are secure based on a random Oracle model

Security for online transaction

Reasonable and user-acceptable scheme for online transactions

[13]

Multi factors security evaluation system for mobile payments,

Machine learning approach

Payment fraud detection which ensures a safe and secure mobile payment platform

The consequences are enhancement of security and reliability

[14]

Security in banking due to the lack of trust

Tip ring ring sleeve (TRRS) Connector,

environment to secure transactions

strong security of authentication for transaction

[15]

Transaction security

Visual cryptographic scheme

The implementation of secure payment based on technology to provide guarantees for mobile-based 2FA

security of our scheme against various attacks

[16]

The model could protect the stolen credit card used by someone

Online transaction algorithm

The issue with credit card protection is the prevention of thieves accessing without a valid code to prevent the stolen card information from making purchases

This model protects the stolen card

[17]

Reestablishing and maintaining customer trust in mobile money services Improving Mobile Money Security

Biometric for authentication

To authenticate legitimate users,

3% enhancement authentication for a further level of security

[18]

Security attacks

For authentication, homomorphic MAC

Approaches to avoid the presented attack

Enhancement in attack resistance

[19]

Unsecure mobile payment

Near field communication technology mobile secure transaction scheme

Secure mobile transaction

Mobile secure payment

[20]

Authentication for secure transaction

One-time password (OTP), GPS, identification number (PIN)

Fraudsters prevention from performing online transactions

At the maximum rate of detection rate of the proposed system

[21]

OTP schemes vulnerabilities for classical execution

Scheme for (QOTP) Quantum OTP with biometrics

The trusted third-party holders take the user's biometric data to authenticate

Secured transactions based on control of no cloning and quantum cryptography principles

[22]

User authentication

Decentralization of fraud-proof roaming blockchain-based authentication framework

Roaming authentication ensures that Legitimate users allow to access the network securely

Security feature-based acceptable authentication delay

[23]

Mobile transaction security

The certificate less signature (CLS) scheme

Secure transaction security

Based on the improved CLS scheme, secured mobile transaction

[24]

User authentication in a mobile environment

Biometrics, dynamic OTP

User authentication

Provided authentication factors to the Android platform for user authentication

[25]

Low level of recognition success rate

Finger vein technology

Required the development of a secure system for information security

Protected the information based on finger and vein solution

[26]

Authentication

Message authentication codes, artificial-noise-aided MACs

The resistance of critical recovery attack

Authentication accuracy increased

[27]

Authentication for authorized users of financial systems

Message service (SMS) text messages

Reducing identity theft

Security, especially in the financial industry

[28]

Transaction authentication

Blockchain, private key (Seed Key)

Transaction authentication in blockchain technology

Theoretical support of Blockchain application

[29]

Transaction security

Biometric, finger scene, eye iris, and palm print use the rivest cipher (RC4), discrete wavelet transform (DWT) algorithms

Ensure hustle-free transactions

80% authentication can be possible with a one-time password

[30]

To be authenticated must also be encrypted

Novel techniques for authenticating short encrypted messages

Confidentiality and integrity are required in a message system

To utilize the security that the encryption algorithm can provide to design more efficient authentication

[31]

Secure mobile payment

Near-field communication (NFC) technology

Unknown payment has received recent attention

The best way to secure mobile payment

[32]

Authentication for mobile transaction

Biometric, Fingerprint, and Face recognition

Money security and privacy

Easy, fast, and secure transaction

[33]

Customer authentication

CNN, region-based convolutional neural networks (RCNN), and deep face are deep learning algorithm

Image is fake or real, with image chain for OTP

The accuracy of this experiment is 75.35,

[34]

Identity Problem

Authenticated key agreement (AKA), Certificate less AKA, Public key Infrastructure (PKI),

Mitigate the vulnerabilities above

Blockchain-based Wireless Body Area Network (WBAN) security

[35]

Continuous authentication

Behavioural biometrics, sensors, accelerometer, gyroscope, magnetometer, and touchscreen

Banking application with continuous authentication

Secured authentication

[36]

Authentication

Biometric cryptography utilizes, for authentication, quantum entanglement property to generate OTP (QOTP)

Man-in-the-middle prevention and identification of vulnerabilities

Resisted the attack

[37]

Financial security

Cryptography and network protocols

Fraud, extortion, money laundering, and financing activities protection

Enhancement in Financial security

[38]

Authentication for online banking

Multi factors authentication

Authentication for banking

Multifactor authentication accuracy is greater

[39]

Mobile base secure payments

Biometric, payment services directive (PSD2)

Transaction security against the risk

higher perception of authentication risk

[40]

Mobile-based banking authenticating

Graphical OTP

Problem by suggesting Two-Factor authentication

Digital certificate from banks enhanced the security

[41]

Authentication

wireless sensor network (WSN)

Factor-based authentication

Enhancement in authentication

[42]

Authentication security for mobile-based transactions

PIN and fingerprint biometrics authentication

Authentication for payment

Biometrics authentication is a concern and significant for individual security

[43]

Transaction security

SMS security based on elliptic curve cryptography

In a global communication system, SMS is not secure

Security framework for SMS banking

[44]

Transaction vulnerabilities

Nil

Cyber security

Security information's