From: Role of authentication factors in Fin-tech mobile transaction security
Refs. | Problems | Techniques | Challenges | Results |
---|---|---|---|---|
[12] | In insecure public communication networks, mobile payments | Mobile payments through certificate less cryptographic primitives are secure based on a random Oracle model | Security for online transaction | Reasonable and user-acceptable scheme for online transactions |
[13] | Multi factors security evaluation system for mobile payments, | Machine learning approach | Payment fraud detection which ensures a safe and secure mobile payment platform | The consequences are enhancement of security and reliability |
[14] | Security in banking due to the lack of trust | Tip ring ring sleeve (TRRS) Connector, | environment to secure transactions | strong security of authentication for transaction |
[15] | Transaction security | Visual cryptographic scheme | The implementation of secure payment based on technology to provide guarantees for mobile-based 2FA | security of our scheme against various attacks |
[16] | The model could protect the stolen credit card used by someone | Online transaction algorithm | The issue with credit card protection is the prevention of thieves accessing without a valid code to prevent the stolen card information from making purchases | This model protects the stolen card |
[17] | Reestablishing and maintaining customer trust in mobile money services Improving Mobile Money Security | Biometric for authentication | To authenticate legitimate users, | 3% enhancement authentication for a further level of security |
[18] | Security attacks | For authentication, homomorphic MAC | Approaches to avoid the presented attack | Enhancement in attack resistance |
[19] | Unsecure mobile payment | Near field communication technology mobile secure transaction scheme | Secure mobile transaction | Mobile secure payment |
[20] | Authentication for secure transaction | One-time password (OTP), GPS, identification number (PIN) | Fraudsters prevention from performing online transactions | At the maximum rate of detection rate of the proposed system |
[21] | OTP schemes vulnerabilities for classical execution | Scheme for (QOTP) Quantum OTP with biometrics | The trusted third-party holders take the user's biometric data to authenticate | Secured transactions based on control of no cloning and quantum cryptography principles |
[22] | User authentication | Decentralization of fraud-proof roaming blockchain-based authentication framework | Roaming authentication ensures that Legitimate users allow to access the network securely | Security feature-based acceptable authentication delay |
[23] | Mobile transaction security | The certificate less signature (CLS) scheme | Secure transaction security | Based on the improved CLS scheme, secured mobile transaction |
[24] | User authentication in a mobile environment | Biometrics, dynamic OTP | User authentication | Provided authentication factors to the Android platform for user authentication |
[25] | Low level of recognition success rate | Finger vein technology | Required the development of a secure system for information security | Protected the information based on finger and vein solution |
[26] | Authentication | Message authentication codes, artificial-noise-aided MACs | The resistance of critical recovery attack | Authentication accuracy increased |
[27] | Authentication for authorized users of financial systems | Message service (SMS) text messages | Reducing identity theft | Security, especially in the financial industry |
[28] | Transaction authentication | Blockchain, private key (Seed Key) | Transaction authentication in blockchain technology | Theoretical support of Blockchain application |
[29] | Transaction security | Biometric, finger scene, eye iris, and palm print use the rivest cipher (RC4), discrete wavelet transform (DWT) algorithms | Ensure hustle-free transactions | 80% authentication can be possible with a one-time password |
[30] | To be authenticated must also be encrypted | Novel techniques for authenticating short encrypted messages | Confidentiality and integrity are required in a message system | To utilize the security that the encryption algorithm can provide to design more efficient authentication |
[31] | Secure mobile payment | Near-field communication (NFC) technology | Unknown payment has received recent attention | The best way to secure mobile payment |
[32] | Authentication for mobile transaction | Biometric, Fingerprint, and Face recognition | Money security and privacy | Easy, fast, and secure transaction |
[33] | Customer authentication | CNN, region-based convolutional neural networks (RCNN), and deep face are deep learning algorithm | Image is fake or real, with image chain for OTP | The accuracy of this experiment is 75.35, |
[34] | Identity Problem | Authenticated key agreement (AKA), Certificate less AKA, Public key Infrastructure (PKI), | Mitigate the vulnerabilities above | Blockchain-based Wireless Body Area Network (WBAN) security |
[35] | Continuous authentication | Behavioural biometrics, sensors, accelerometer, gyroscope, magnetometer, and touchscreen | Banking application with continuous authentication | Secured authentication |
[36] | Authentication | Biometric cryptography utilizes, for authentication, quantum entanglement property to generate OTP (QOTP) | Man-in-the-middle prevention and identification of vulnerabilities | Resisted the attack |
[37] | Financial security | Cryptography and network protocols | Fraud, extortion, money laundering, and financing activities protection | Enhancement in Financial security |
[38] | Authentication for online banking | Multi factors authentication | Authentication for banking | Multifactor authentication accuracy is greater |
[39] | Mobile base secure payments | Biometric, payment services directive (PSD2) | Transaction security against the risk | higher perception of authentication risk |
[40] | Mobile-based banking authenticating | Graphical OTP | Problem by suggesting Two-Factor authentication | Digital certificate from banks enhanced the security |
[41] | Authentication | wireless sensor network (WSN) | Factor-based authentication | Enhancement in authentication |
[42] | Authentication security for mobile-based transactions | PIN and fingerprint biometrics authentication | Authentication for payment | Biometrics authentication is a concern and significant for individual security |
[43] | Transaction security | SMS security based on elliptic curve cryptography | In a global communication system, SMS is not secure | Security framework for SMS banking |
[44] | Transaction vulnerabilities | Nil | Cyber security | Security information's |