INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 11 NO. 5 2025
DOI: 10.56201/ijcsmt.vol.11.no5.2025.pg18.33


Modeling Effective Information Security in Mobile Banking System

Ikemelu Chinelo Rose-Keziah, Agbakwuru A Onyekachi, Amanze Bethran Chibuike


Abstract


The objective of the study is to develop mobile based application multifactor authentication (MFA) model for effective information security in the mobile banking system that utilizes three (3) tiers of security authentications options; the use of (PIN); (PIN & Finger Print) and (PIN, Finger Print & OTP) for strong authentication that will be difficulty for unauthorized access or cyber criminals to penetrate. This study also applied RSA and AES crytographic algorithm. The motivation of this study is as a result of prevalent and incessant fraud associated with the current single factor (SF) or two factor (2FA) authentication mechanisms in the existing mobile banking system, which is as a result of high demand of mobile devices for mobile banking transactions. The methodologies that were adopted are Object-Oriented Analysis and Design (OOAD) and Agile. Top-down bottom approach in software development was adopted. Software tools include Java, Flutter SDK, Dart programming and Firebase- MySQL. The results of implementation and testing were secured mobile based application MFA model for affective information security in the mobile banking system that utilized three (3) tiers of security authentications; the use of (PIN), (PIN & finger print) and (PIN, finger Print & OTP) for access controls depending on the amount to be transacted, secured device-IMEI of every registered user, redirection of unauthorized access to the honeypot and provision of detailed transaction history of customers. These multi-factor authentications will be difficult for authorized user or any criminal attack such as phishing, impersonation, surfing attacks and man in the middle attack to penetrate the transaction system in mobile banking system.


keywords:

PIN, RSA, AES, OTP


References:


Greig et al., (2019) Andrews, Karen Renaud, and Stephen Flower day (2015).An ethnographic
study to assess the enactment of information security culture in a retail store. World
Congress on Internet Security (WorldCIS). IEEE, .chicago. Retrived, 12th Aug., 2020.
Danvas, M. and Ngugi, K. (2014): Determinants Influencing Adoption of Radio
Mcgladery, P. (2013). Information Security and Information Assurance: The Discussion about
the Meaning, Scope and Goals. In: Organizational, Legal, and Technological Dimensions
of Information System Administrator. Retrieved, 13th June, 2022.
Sahaji&S.Soman(2020).security improvement mobile banking using hybrid Authentication.
Processing in of 3rd international conference in Artificial Intelligence . Istanbul, turkey ,
Retrieved, January ,2023.198-201.
Ferrage, M.A et al (2020) .Authentication schemes for smart mobile devices: threat models,
countermeasures, and open research issues. 1-32 Retrieved, 12th August 2022
Jayshri, S.,Jagrutisonar, S.&Komal, S.(2021).Multifactor authentication for bank using mobile
phones. International research journal of engineering and technology (IRJET).
Retrived , 10th November,2022.
Santhi, B. and Kumar, K. (2012), Novel Hybrid Technology in ATM Security Using
Biometrics. Journal of Theoretical and Applied Information Technology. Retrieved, Apirl
Vol.37(2).217-221.
Chris, E.M. (2019) Atm Machine Security: Bank Atm Security Device . Http// www. Crime doctor
.com/business htm. Retrieved, 15th October, 2022,2-4.
Rajalakshmi,P. sangeetha,R.vanathi, b. shanmugam, K . , Sindhya S.(2019).
International Journal of Engineering Development and Research ( IJEDR) chennai,
india(www.ijedr.org) Retrieved, 29th March, 2023.1-9
Sahaji&S.Soman(2020).security improvement mobile banking using hybrid
Authentication. Processing in of 3rd international conference in Artificial Intelligence .
Istanbul, turkey , Retrieved, January ,2023.198-201.
Mohamed, Tamara .S. (2014) Security of Multifactor Authentication Model to Improve
Authentication Systems Information and Knowledge Management Vol 4 No 6. Retrieved,
13th June, 2022
Guma,A. M,A.&Anael, E.S.(2020).Two factor authentication scheme for mobile money review of
threat models and countermeasures. Future internet.www.mdpi./com/journal/furture
internet. Retrieved ,12th Septermeer,20231-3
Rahav,A.(2018).The secret security wiki.(http://doulbleoctopus.com/security-
wiki/authentication/single-factor-authentication. Retrieved ,6th November ,2022.1-3
Rahav,(2018) (A. The Secret Security Wiki: https://doubleoctopus.com/security-wiki/
authentication/single-factor-authentication/ .Retrieved on 4 February 2023.
Deepa, Malviya (2014).Face Recognition Technique: Enhanced Safety Approach for ATM
.International Journal of Scientific and Research Publications, Vol. 4, no. 12,
www.ijsrp.org. Retrieved, April 4th, 2022 ,. 1-4.
Ndunagu J.N. et al.,(2019). Development of mobile banking security: Multifactor Authentication
Approach. Journal of electrical and telecommunication system research Retrieved 10,
Sept., 2022.
Jayshri, S.,Jagrutisonar, S.&Komal, S.(2021).Multifactor authentication for bank using mobile
phones. International research journal of engineering and technology (IRJET). Retrived ,
10th November,2022.
RohitNarkede et al (2016). International conference on research entertainment and
advancements in technology and engineering http://www.ijerom.org. Retrieved, January
8th, 2024.1-5.
Mohamed, Tamara .S. (2014) Security of Multifactor Authentication Model to Improve
Authentication Systems. Journal of Information and Knowledge Management. Vol 4 , 6.
www.ijste.org.Retrieved, 4th August, 2022.81.
Adeoye, O. S. (2012). Evaluating the performance of two-factor authentication solution in
the banking sector. International Journal of Computer Science Issues, 9(4), 457–462.
Mo hammad, B.L. Alhassan M.E. and Ganiyu, S.O. (2015). An Enhanced Atm
Security System Using Second-Level Authentication. International Journal of Computer
Applications. Vol.111(5)Retrieved February 2015.1-6.
Sasidevi, J., Sugumar, R., &Priya, P. S. (2015). New-Multi-Phase Distribution Network
Intrusion Detection, 5(3), 1277–1280.
Bilal, M., &Sankar, G. (2011). Trust & Security Issues in Mobile Banking and it's Effect on
Customers. Karlskroma: Blekinge Institute of Technology.16- 20 .
Cha, B., Lee, S., Park, S., &Ji, G. L. Y. (2015). Design of Micro-payment to Strengthen Security
by 2 Factor Authentication with Mobile & Wearable Devices, 109, 28–32
RohitNarkede et al (2016). International conference on research entertainment and
advancements in technology and engineering http://www.ijerom.org. Retrieved, January
8th, 2024.1-5.


DOWNLOAD PDF

Back


Google Scholar logo
Crossref logo
ResearchGate logo
Open Access logo
Google logo