Skip to main content

Table 9 The supporting technologies and features highlighted in the articles for the proposed System

From: Role of authentication factors in Fin-tech mobile transaction security

Feature

Technology used

Functions

References

Biometric

Finger-drawn signatures on touch devices

Sensors, electro cardio gram, phono cardiograph, convolutional neural network (CNN), Electroencephalogram

Fast identity online

Swipe-V-lock

Al m print-based key generation system

voice recognition technology

Common spatial patterns (CSP) values, electrocardiogram (ECG) data for authentication, and conventional biometric methods were the significant elements in training the model. A classification method called linear discriminant analysis (LDA) was applied for specific user data collection. The server-based authentication approach uses the distributed management of compliance-based biometric data. Viable methods for banking security and authentication. Using a backdrop image to swipe the smartphone screen. Behavioural biometrics can secure mobile payments, improve usability, and stop fraud. When using biometrics for two-factor authentication, OTP is employed to strengthen the security of weak passwords. Information security now includes promising technologies like cryptology and biometrics

[50,51,52,53,54,55,56,57,58,59,60, 63, 70, 75,76,77, 92,93,94, 96, 100, 101]

Password

Graphical passwords (G.P.s)

Smartwatch worn

To further enhance the security of Fin-Tech applications, the route map is a map- and route-based G.P. Wrist movements are made by the cardholder while inputting a PIN or password, which is employed as an authentication factor. Strategies to encourage the usage of safe passwords are examined, and their implications are discussed. Users construct passwords according to trends and patterns. It thoroughly looks at how easily these real-world passwords may be guessed. Information is sent to a password manager

[69, 73, 74, 78, 90, 104]

OTP

Image-based password System (IBPS)

Time-based one-time password (TOTP)

Embedded hardware OTP

Linear congruential generator (LCG)

Authentication code by hash algorithm

Mobile identity

Authentication mechanism

The second element for robust authentication after the password is OTP. To appropriately safeguard the system from unwanted third-party auditors, the system uses an automated blocker protocol (ABP) and time-based one-time password (TOTP) for cloud user verification. For instance, OTP is produced on the server and delivered to clients by SMS. Embedded hardware OTP generating device using dual tone multi-frequency (DTMF) signals for remote requests The OTP produced by LCG is not repeating, and it is difficult to predict the randomness. OTP is crucial for safe banking financial transactions. A more secure authentication method is the one-time password (OTP). It ensures that both entities are genuine throughout a single session

[46,47,48, 82, 86, 91, 95]

Q.R. code

Digital watermarking-a data Hiding technique

The bank’s SPAQ website

AES encryption algorithm

VQ-compressed code, which is utilized for picture authentication and print-and-scan, visual cryptography, code, and one-time PIN, is a significant tool (OTP). For safe financial transfers, a two-factor authentication protocol is used for a time-based one-time password (TOTP). Defend against phishing attacks. An extra layer of protection will be provided through the public critical infrastructure (PKI)-maintained, quick response (Q.R.) code security mechanism. Here, robust authentication is carried out utilizing Q.R. matrix barcodes, which have a large storage capacity for plain-text and encrypted data. Financial services are more secure using the integrated Q.R. code in the Adhere card and biometric authentication. W codes protect private data. High levels of convenience and security are achieved with visual authentication techniques

[46, 61, 62, 68, 72, 83,84,85, 87, 89, 97, 99]

MAC and IMEI

Channel state information

A secure hash algorithm (SHA) is a cryptographic hashing algorithm

Address resolution protocol (ARP)

International mobile equipment identity

Techniques of device identification employ this technology. The suggested technique can increase security regarding confidentiality duration and secrecy capability. The international mobile equipment identity (IMEI) uses the backstage covert automatic identifying form of authentication

Algorithms for hybrid encryption algorithm (HEA)

[64,65,66, 71, 80, 102]

A.I. and machine learning

Generalized algorithm

A.I. and machine learning techniques

Prospects of artificial intelligence (A.I.) in security, outstanding challenges that require additional A.I. investigation, and machine learning techniques to identify fraudulent bank card transactions. One of the known methods for identifying credit card fraud has been created using behaviour analysis and machine learning techniques. It has been designed to detect fraudulent transactions using reinforcement learning, supervised learning, unsupervised learning, and parametric/non-parametric methods. Through A.I. and machine learning approaches, online fraud in e-Commerce and financial transactions is prevented and controlled. Approaches to authentication based on machine learning

[49, 67, 79, 81, 88, 98]