Introduction

Fin-Tech refers to financial operations based on technology, including money transactions to operate financial activities, including transactions to handle business and customers. It makes simple, easier, more accessible, and generally more affordable financial transactions for customers and businesses.

The encrypted blockchain, two-factor, and three-factor authentication have been widely accepted—fin-Tech attempts to streamline the transaction process, eliminating potentially unsecured processes for all parties involved. The best example is a mobile service, such as Venmo or CashApp, which allows users to pay each other 24 h daily, sending cash to their preferred bank account immediately. The receiver would need to go to the bank to deposit the funds if you chose to pay with cash or cheque instead.

Mobile commerce is described as doing business or providing a service using a mobile application connected to the internet to conduct a transaction using a mobile device for any money. It may be used to make online purchases, pay bills, send money to others, make hotel reservations, and order your favourite meals from nearby restaurants. Mobile commerce generates more security issues than traditional e-Commerce since it conducts online business [1]. The massive use of mobile devices for online payments cannot satisfy the security requirements of protecting sensitive data or user privacy in e-commerce. However, maintaining mobile transactions' sustainable and steady advancement is difficult for online authentication technology based on traditional methods [2].

Online financial scams are among the most prevalent cybercrimes, likely due to rising digital currency usage. One of the simple cybercrimes that fraudsters target is using stolen credit or debit cards. The most common scam is with 39% in the category of fraud in Europe. The vast impact of scams was about 79% financial harm. The consequences are a financial loss of 66% and 29% no loss [3, 4].

The analysis paints a clear picture of why better authentication is necessary for online banking. It outlines the critical security issues and criminal activity that requires authentication improvement and demonstrates how customers and financial institutions are driving the expansion of the online channel to deploy better authentication in the online banking environment. There are numerous solutions accessible. This study clarifies them and offers a resource for understanding them. Through the industrial experience base, technology is highly involved in security. It is available, as well as a set of recommendations for choosing and implementing improved authentication [5].

The message is one of the most popular and tested mobile services with worldwide accessibility across all global systems for mobiles (GSM)/code division multiple access (CDMA). The confirmation text is the short messaging service. The current short message service (SMS) can only secure plain text between the sender and various mobile phone users and servers for many purposes. The SMS lacks a built-in mechanism for text message authentication and provides no security for text messages sent as data [6].

A triangle relationship can be a schematic representation of an electronic commerce transaction between a person and an operator of the value service. On one side, the individual wants to benefit from the user's offer. A specific digital identification that specifies the social standing and their commercial relationship with the operator, such as proof of their capacity to pay for a service, is required to contact the operator. Through his identity and service management system, the operator manages the access rights to his valuable services and assigns these rights to authorized users or clients. A person who wants to utilize the user service must produce identification to prove her identity [7].

The automated teller machine ATM, credit card, debit card, and other cards are now frequently used for bank transactions and are essential in the banking industry. In this study, a biometric authentication system that combines the usage of a proximity sensor with a biometric authentication technique is proposed. This concept combines a shuffling keypad approach and a biometric fingerprint mechanism to increase the security level of ATM transactions [8]. The electro card usage poses issues related to the safety and security of financial transactions. It is suggested and discussed how to use mobile technologies to strengthen the security and protection of electronic bank card transactions. However, the customer reads the one-time password sent through short message service SMS and enters it in the username and password section [9].

The security issues so that future services might be better and more secure to categorize contemporary. Mobile Fin-Tech payment service sources into hardware manufacturers, operating system makers, payment platform insurers, and financial institutions; the study first defined existing and Fin-tech payment services by comparing them. Regarding reciprocal authentication, authorization, integrity, privacy, and availability, it defends the standards that mobile Fin-Tech payment services must satisfy and the security issues that both current and future mobile Fin-Tech payment services will face. Future mobile Fin-Tech payment systems are anticipated to become more secure due to the proposed study [10].

Multifactor authentication (MFA) is a fast-growing technology. Initially, only simple keywords were used to protect the data; after that, the password was used to protect personal accounts, called one-factor authentication, and two-factor authentication, which involves a one-time password (OTP) after verifying the password. However, fraudsters try to use different ticktacks to get the user data for fraudulent transactions to prevent fraud; it is essential to involve Biometric authentication called three-factor or can be more than there called multi-factor authentication. The integration of biometrics came from simple figure print IoT devices used in personal identification in the government sectors, but it is now integrated into mobile phones. The use of figure print is the physical identification of a person.

The improvement in the financial technology security the user authentication is concerned with using MFA approaches such as biometric and quick response (Q.R.) codes and the combination of personal identification number (PIN) and OTP instead of two-factor authentication (2FA) using (PIN) and subscriber identity module (SIM). The MFA may be obtained by implementing various security algorithms to identify the user that ensures user authentication to maintain data confidentiality, integrity, and privacy [11]. The proposed study has highlighted the technology for authentication that can quickly transform into user authentication. Except for having authentic information, it also should require biometric authentication during transactions, which may not be shareable like (one-time password) OTP, to ensure that the user is legitimate or fake.

The study objectives are:

  • To analyze the previous study in comprehensive research about security authentication in Fin-Tech from the perspective of user authentication approaches. The extensive detail will outline the approaches and mechanisms reported for mobile secure money transfer systems in Fin-Tech.

  • To extract detailed information about the user authentication framework to ensure user authentication, address fraud detection based on a multifactor authentication approach for secure mobile money transactions, and protect the user account from unauthorized access in Fin-Tech.

  • To identify the various technologies in terms of hardware and software used in the previous system for secure mobile money transfer in the Fin-Tech sector and highlight the implemented method and its outcome in the user authentication system.

  • To learn about the supporting features, technologies, and functions used for user authentication in the Fin-Tech mobile money secure transaction system.

  • To highlight a previous SLR study based on current issues for mobile money secure transactions, whereas the Fin-Tech, make recommendations for developing an optimal security solution for mobile money transactions, and identify current challenges for researchers that will be useful in future research work.

The proposed paper is divided into sections, in which Sect. “Background study” has the research background and related studies about the proposed field. The intended information extraction methodology for the systematic literature review SLR task is outlined in Sect. “Methodology”. Results from previous user authentication for safe mobile money transactions in Fin-Tech are presented in Sect. “Results and discussions”. Explains the drawbacks, advantages, and benefits of the suggested SLR and identify the field’s subsequent developments. Conclusions and challenges for future work are included in Sect. “Conclusion and future work”.

Background study

The proposed study is to identify the multifactor authentication (MFA) role in user authentication for secure transactions via mobile devices. The mobile-based applications assist the money transaction in a secure environment to ensure the security of the user credential information. Transaction fraud may be caused by the leakage of user credential information. The massive technological developments have made the system vulnerable, where the fake app used to steal the user credential information for fraudulent transactions is concerning. The study was based on how to stop the transaction of someone having all the information, including OTP. Much work has been reported in the Fin-tech fields of money transactions in the last decade through mobile phones and bank applications. This paper section shows the relevant work written in the proposed area. The adversary model for mobile-based money transactions via random oracle model addresses users' strong security during online payment [12]. The Machine Learning-Assisted Secure Mobile Electronic Payment Framework effectively identifies fraud in mobile transactions and malware and user authentication. The effective Random Oracle Model is utilised to determine the existence of malware on a host system and the difficulties with multifactor authentication presented by mobile payments [13]. The safe IoT device-based trustworthy e-banking defence may be transferred to the mobile world. Regarding a secure transaction environment where trusted devices use tried-and-true methods, mobile-based financial transaction fraud detection is concerned [14].

The visual cryptographic scheme is used to check the transaction authentication number. The transaction information displays the transaction details and an authentication number while the card is encrypted [15]. The two-factor authentication uses a random code based on a secure online transaction algorithm, which is highly desired by businesses for a safe manner to make online purchases without a code working, or an unauthorized user cannot utilize the stolen card information for purchasing purposes. This is the security for the consumer credential information of credit card corporations from suffering financial loss [16]. The user authentication method for mobile applications uses biometric authentication on every feature within a single platform in a secure and user-friendly manner concerning the level of risk [17]. The efficient homomorphic media access control (MAC) use to guess the attacker randomly. It is a small finite field for authentication in network coding [18].

The innovative mechanism is independent of the manufacturer of the mobile device and the mobile network provider. It employs tamper-resistant components already present at the transaction terminals. The secured near-field transaction model will be helpful for mobile identification, payment, and access control in various security-sensitive IoT situations [19]. It is challenging to discern between legitimate and unauthorized users when detecting fraudsters in online transactions from gadgets [20]. The Quantum entanglement offers a blueprint for using built-in security advantages and user biometrics as authentication data with quantum communication. The authentication process is implemented over the user and server against a specific transaction, altering the quantum one-time passcode QOTP methodology [21]. The decentralized blockchain-based infrastructure for roaming authentication is fraud-proof. Smart contracts construct a roaming authentication protocol that includes user or app registration, authentication, and revocation. We use the Bloom filter for the revocation procedure for more efficiency [22].

Furthermore, a concrete architecture of a certificate-less signatures (CLS) scheme with better security is described to address the security vulnerabilities mentioned earlier. Assuming it is impossible to solve the discrete logarithm issue, the better technique may be strictly demonstrated using the forking lemma in the random oracle model. Finally, from our enhanced CLS technique, a secure transaction strategy for smartphones [23]. The acquired and inherence information are used as the three authentication factors for user authentication. As mentioned earlier, the authentication strategy alludes to the potential for executing the procedure in the mobile environment of the mobile application with assured authentication assistance [24]. The convergence of biometric information technologies for communication sparked the desire for more practical, cutting-edge, and enhanced security solutions. Because of the poor recognition rate caused by duplication, many biometrics technologies involve certain risks when used as a secure authentication solution for financial services. As a result, it is best to avoid this issue from emerging to improve the security of financial services and safeguard information. This study suggested an authentication security model for finger vein solutions. [25].

An image-based identity secure authentication approach more rigorously addresses the authenticated system [26]. The (SMS) text messages are used to register the authentication in the mobile phones for authorized users. This is a summary of two polls and several securities expert interviews. The SMS was evaluated as a practical way to reduce impersonation when using Internet resources, particularly in the banking sector [27]. The innovative blockchain anti-quantum transaction authentication method creates compact nondeterministic wallets. The critical thing to remember is that Seed Key is a collection of master public and private keys from which public and private keys are produced. Our new authentication approach, which may expand a lattice space to numerous lattice spaces with the associated key, uses the Bonsai Trees technique [28]. User identification via biometrics has been introduced. This contains characteristics like palm, finger, and iris prints for more precise personal identification. The suggested solution is best for personal identification and requires strong security while making online purchases, doing net banking transactions, etc. If the match rate for any unique biometric characteristic is lower than 80%, the user must be authenticated using a one-time [29]. Reliable message authentication codes are more effective than any others in the literature. The central concept behind the suggested methods is to develop more effective authentication processes using the security that the encryption algorithm may give rather than utilizing solo authentication components [30].

The module authenticates the user identification using a capacitive fingerprint sensor before establishing Bluetooth communication with an Android application loaded on the smartphone. The program handles both peer-to-peer payments made through near-field communication and fast response codes at the merchant point of sale. The tokenization mechanism significantly improves the security of the transaction. The application may also create a digital id [31]. Data security and privacy are provided through face recognition and fingerprint matching. This voting application via ATMs makes it very convenient for consumers to cast more ballots [32]. The photos are identical, and the user's mobile number receives a one-time password for login access. The Python library runs machine learning and deep learning algorithms for authentication using image processing [33]. The first step of the protocol establishes a session key for communications. The second phase of node authentication employs the ring signature. When a node signs a signature on behalf of others, the ring signature can lower computation costs. Other nodes can confirm the signature, and the signing node stays anonymous. Another benefit of ring signatures is that there is no restriction on the number of participants [34]. The continuous authentication for mobile banking apps utilizing behavioural biometrics is described, and its resource utilization performance is examined. The design uses data from the accelerometer, gyroscope, magnetometer sensors, touchscreen activity, and banking applications on Android smartphones [35].

User authentication via biometrics is possible using quantum entanglement and the known features of quantum encryption. Besides the end-user vulnerabilities, the analysis supports man-in-the-middle attacks for the existing and proposed models [36]. It is essential to acknowledge the examination of Fin-Tech and digital payment activities as a new technological sub-discipline within the field of digital forensics. The field of digital forensics is ideally situated to support practitioners with research to improve investigations into Fin-Tech and technological financial activities [37]. The multifactor authentication system was created to accommodate the preferences of international banks. Specifically, multifactor authentication systems are now used in the banking industry in terms of best practices, legal compliance, attack resistance, and complexity. We also look at any connections between these standards [38]. The iris reading is a biometric measurement using the user's smartphone. Analysis was also done on the fear of infection moderating impact on the postulated correlations [39].

The system that uses two-factor authentication uses a one-time visual password. To strengthen for mobile authentication method with simply an id and password or an authentication protocol from a bank, it is an enhancement of the OTP technique that implements the one-time graphical passcode [40]. Comparing the suggested scheme to similar methods with similar countermeasures and security qualities, the proposed scheme performed best in security and is appropriate for application [41]. The primary concept in preventing credential stuffing is multifactor authentication. However, threat actors may get around it by using interactive social engineering due to the availability of credential data sets, contact information, and association with demographic data. As privacy-protecting technologies decrease the observable difference between legal and fraudulent user sessions, alternative defence methods like network source profiling and device fingerprinting have become less effective [42]. The automatic validation of online security protocols computational models’ tool and Scyther tools are used to validate this framework using formal methodologies empirically. For application scenarios, security research demonstrates that the suggested method performs better than the already-used SMS payment mechanisms [43]. The Fintech ecosystem has vulnerabilities, but the financial institutions and startups have the most since they employ cutting-edge technology to update outdated financial institutions into modern Fin-Tech ones. Technology developers must know threats that might exploit technological weaknesses and vulnerabilities connected to cyber security issues [44].

Methodology

The proposed systematic literature review mainly concerns the security and fraud detection or access control systems for users to transfer money from one account to another. This scheme is manageable in situations where the criminal person uses the credential information of another person to access their account to transfer the money from their account to their account. This study provides the guidelines and direction for a specific advanced and robust system to detect criminal operations, aside from two-factor authentication (2FA) applications and SMS receiving. This literature study has been done systematically based on previous studies on the problem. This methodology section is done with the help of tools and techniques for conducting research. The systematic literature review adopted from previous studies from the journals of famous publishers in the area of problem is the step-by-step method to explain the proposed review adequately. The collection was based on different parameters from five IEEE, Springer, Elsevier, Wiley, and Taylor & Francis publisher libraries. The search queries were used for the extraction of the information. The statistical methods will identify the limitations or difficulties encountered after collecting and testing the data to obtain the desired results.

Systematic ultrapure review process

This systematic literature study consists of all the information taken from the suggested publishers and downloaded from their libraries to fulfil the objective regarding the research title and address the research problems. The proposed literature review is followed by specific steps, in which the first one is identifying problems, which indicates the title of the proposed systematic literature review. The next step is creating a research question formulated according to the problem addressed and the research objectives. The query schedule identifies databases from its libraries for searching for related information to address the problems. The results and discussion include the calculated results for the objective-based information Tables, and the arguments consist of reviews of the results, the findings, and the conclusion. The finding and conclusion sections have the whole meaning of information about our review study, and the conclusion has the final decision on the systematic literature review. The conclusion of the research work must follow the objectives of the research work. The last paragraph consists of future challenges to provide a new path for the researcher for further forward movement.

In Fig. 1, after the research problem is identifying the research question or extracting the information, the scheduling of these questioners and modification for search concerning searching libraries in the final is the result, and discussion after then is the identification of the conclusion and future work.

Fig. 1
figure 1

Literature review process

Research questions identification

The research questions identify the relationship between the current problems with the past that addresses the solution. The research title, the identified research question, is the query for extracting the relevant information. The research questions are the research queries used to achieve the research objectives. The research objectives are supposed to be under the domain of the research problem, made up of searching keywords. It is the second of the review study after the confirmation of research objectives. The research question is depended upon the strength of the objective. This study identified four research questions to extract the desired information to achieve the study objective. These research questions have been used to extract the Information from the general specified to the problem to achieve a comprehensive systematic review has shown in Table 1 represents a set of research questions with its detail. Furthermore, these research questions have been divided into Keywords and small titles for searching purposes in different libraries (Fig. 2). Figure 2 describes the overall process of data extraction, defining the keywords, research questions, and final selection of studies. The figure shows establishing a precise research objective or question, conducting systematic searches for and selecting pertinent studies from a range of sources, searching and filtering research using predetermined inclusion and exclusion criteria, employing a standardized process to extract important data from a subset of trials, combining and examining the data that was extracted to find trends, patterns, and insights, evaluating the reliability and caliber of the studies that were included, making a summary of the results, and, if necessary, completing a meta-analysis using the combined evidence to draw inferences and implications.

Table 1 Review questions for money transaction authentication of secure fin-tech system
Fig. 2
figure 2

Research steps for data extraction

Library selection for information extraction

The library selection was based on specific crates defined by research objectives. The articles selected from the fool studies are shown in Table 1. The popular libraries selected out of global libraries with the most relevant article are chosen for the literature review study as proposed. The selected study pool contains some journal articles and book sections with pertinent information.

  1. a)

    Search procedure from digital libraries

Initially, the most relevant articles that have been studied address current issues. Furthermore, the selected articles are considered for the development, guidance, and direction for the assistance of future work. The proposed research work addresses the current problem that has been searched from five libraries. The involved libraries have searched from the IEEE Explore database ha used to search for the concerns article from the journal IEEE Publisher. Secondly, Science Direct has used to extract the concerns information from any journal of Elsevier Publisher Thirdly, has used Wiley from Wiley online in fourth Stringer, and fifth Tayler and Francis. The information extraction has been done to achieve the study objectives, as shown in Table 2. The proposed study has been obtained with the use of the following:

  • Searched by titles

  • Searched by keywords

  • Searched by queries

  • Criteria for selection

Table 2 Proposed study extraction based on keywords, titles, and query
  1. b)

    Searching procedures

The papers for the proposed literature review have been downloaded from different journals of a publisher using individual Databases of libraries. This study has literature from different journals, IEEE, Springer, Elsevier, Wiley, Tayler, and Francis. The key term is the use of Specific topic queries and keywords used to extract the information based on criteria in which inclusion and exclusion are also concerns. The obtained result from the searched libraries is shown in Table 2, filtered by years from 2013 to 2022, and also searched only journal articles and some books.

  1. c)

    Searching for articles by title

The title of an article represents the main problem. It is most important to identify the specific groups of titles for searching the proposed literature review in which the information addressed the problem, the issues, techniques, and its solution. The implementation of the title is applied where the key world result is too low.

  1. d)

    Searching of articles by key words

Keywords are mostly also most words you enter into the journal database to search the article in a specific knowledge domain. It is the representation of the original concepts related to your concern topic. The right keyword is vital for searching for a piece of specific information that might be impossible to reach the goals without the perfect keywords in multiple steps of the process to identify the keyword for the central concept of our related problems with the help of synonyms and antonyms that could also be used to describe the problem.

Making queries for searching

The search query is the combination of keywords to specify the desired result to be obtained. The query was entered with the intent of finding relevant articles having information address the problem. The queries in Table 1 combine the essential world from generalized and particular searches using the 'OR' and 'AND' operations.

In Table 3 above, the formulated queries have provided the base for searching approaches where we focused on the search of more near to the research problem to achieve the objective of the proposed study. The queries as mentioned in Table 3 above. It shows the combination of keywords related to our proposed research to identify the supporting technology for mobile money transaction security.

  1. e)

    Inclusion/exclusion criteria

Table 3 Formulated queries for searching the relevant articles

The inclusion/exclusion was based on the information relevancy in which the implementation of the filter during a search is a concern. The downloaded article is containing in a range of 10 years from 2013 to 2022, including journal articles and books where the conference papers and most past papers are excluded by filtration techniques to obtain the research objectives based on identified keywords, titles, and queries searched in the title, abstract, introduction methodologies, results, and conclusion as shown in Table 3.

  1. f)

    Selected articles for review

The collection of relevant research articles is classified into publishers with references to indicate their publisher. Five selected libraries are taken from Table 3, as shown in Table 4. These are the most popular and much-reviewed digital libraries, where many researchers tried to publish their articles with novelty addresses to the problem. The sample selected papers out of the population is 92 [12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43, 45] articles selected after filtration of relevancy for analysis. The selected papers, based on the desired criteria, address the objectives. The pieces of information have been extracted by title, abstract, introduction, result, and conclusion. The proposed study has been done using five libraries IEEE Explorer, science direct, Wiley online library, Springer search library, and Taylor and Francis online search library for the above publisher, shown in Table 4, in which 34 articles are downloaded from IEEE 28 from Elsevier, eight from Wiley, 15 from springer, and 7from Taylor and Francis.

  1. g)

    Classifications of papers

Table 4 Relevant material selection from the downloaded publishers

Publishers classify research articles relevant to the topic by collecting research articles, which are classified in publishers with references to indicate their publisher. Five selected libraries are from Table 4, as shown in Table 5. These are the most popular for advanced searchable and mostly reviewable digital libraries about technologies enhancement for the future with some novelty address to the problem. The selected articles are 92 out of the population with excellent user authentication and transaction security ideas. Filtration of relevancy for analysis. The selected papers were based on defined criteria to address the objectives. The search process has been done by title, abstract, introduction, result, conclusion, and direction of the study from libraries IEEE Explorer, science direct, Wiley online library, Springer search library, and Taylor and Francis. The online search library for the above publisher is shown in Table 5, in which 364 articles are downloaded thirty-four from IEEE, twenty-eight from Elsevier, eight from Wiley, fifteen from Springer, and seven from Taylor and Francis, the most popular publishers.

Table 5 Year-wise segregation of relevant materials corresponding to problems for analysis

Figure 3 represents the trend of Fin-Tech security authentication issues. Figure 3 shows the number of journal articles and books in the year of publication. The number of articles to be analysed year-wise is taken from Table 6, from 2013 to 2022. The selected papers three from 2013, Three from 2014, is seven is, in 2015 is, eight from 2016, eight from 2017, twelve from 2018, thirteen from 2019 is, fifteen from 2020, eleven from 2021 with one book, and twelve from 2022. The total articles are 92 containing relevant information concerning the literature review that addresses the problems.

Fig. 3
figure 3

Year-wise number of downloaded relevant publications

Table 6 The collected articles from journals and books concerning publication years

This systematic survey is shown in Fig. 4, which represents the fool of study that consists of 1 book and 92 journal articles for analysis; which book was downloaded from Springer and published in the year 2021; the rest of all the articles are from journals in which, 31 from IEEE, 30 from Elsevier, seven from Taylor and Francis, 14 from springer, and nine from Wiley.

Fig. 4
figure 4

Publisher consistency articles with their references

Objectives-based data extraction for decision making

The purpose of this literature study was to collect information about Fin-Tech security based on defined Objectives for indication of current and future challenges to the researcher and also awareness about the trend of technologies in finch for secure transactions; for this purpose, the collected information regarding the research questioners are:

q1: Factors-based User Authentication.

q2: Technology has been used for Fin-tech security purposes.

q3: Authentication for secure mobile money transition.

q4: The obtained is supporting the authentication of the user against any fraud in the transaction.

q5: A.I. and machine supporting Fin-tech sec.

Table 7 has been obtained based on the questionnaire answered by the articles. Here we are classified into the categories where they obtained the same type of objectives concerns to the proposed study. C1 consists of articles in the reference column, as shown in Table 7. Five main questions support the proposed research obtained from previous studies. Ninety-two essential articles from Reference [13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102] answered the above questions. Some articles received the same objectives, which provide strong evidence supporting the proposed study and are significant in the research work further the calculation values dependent on it. Based on the questionnaire, some articles answer the same question and come under the same category, which is the classification of the article dependent upon the answers of the questioners. There are eight categories classified in the article. Category ( C1) consists of 33 articles obtained the question (q)1 to q4, where q5 is an absent total of 4 questions answered out of five, C2 has 1 article with three questions, and C3 has two articles with three different questions, and so on. The prominent uniqueness in the same question number defendant upon the unique valve of the question that can obtain the unique value by adding the value of different objectives of the same number of questions.

Table 7 The research question-based objectives and identification

Figure 5 shows all the cited articles publisher-wise with-it years and the number of objectives obeyed according to the predefined criteria. The selected papers consist of a book section or journal article) downloaded from a digital library using their online search engine. The selected libraries are (IEEE, Springer, Science Direct, Wiley Online, and Taylor and Francis) at the top of the search list. Most researchers are trying to identify the current problem with the help of literature. The collected relevant papers are from the session 2013 to 2022, and they cover all of the recent issues and their solutions in various ways from 2013 to the present. Figure 5 has been divided into tracks and sectors, where the first track from the centre shows the publisher, which consists of IEEE, Springer, Elsevier, Taylor & Francis, and Wiley. The second track includes references against that publisher and objectives, whereas the third track represents references in the numbers. The last track represents the article’s year of publication against the publisher, objectives, and references. Whereas in the sector, it shows the year of publication, from 2013 to 2022. Most references are selected from relevant papers in the proposed systematic literature review article. This shows the level of relevancy of the problem with its appropriate solution based on different technologies used to address the security issues.

Fig. 5
figure 5

Objectives-based publication

Table 8 consists of information regarding prescribed objectives to address the challenges, opportunities, and technological concerns of the problem. It satisfied research question 1, where all the required information is desired using unique queries according to question 1. This literature review highlighted the authentication for secure transactions: the challenges, technologies, and their results to secure the financial transaction and mitigate the risk. Twenty-one articles are the most concerned with our problem and address the security authentication problem in money transactions. The other articles consist of technological approaches supporting Fin-tech transaction security. Table 8 discusses the technologies that play the most vital role in user authentication and provide supportive technologies for money transactions in financial technologies. The development of vast technologies increases the vulnerabilities in financial transactions.

Table 8 Supporting technology of authentication for secure transaction

Table 9 represents features with supportive technologies used in the previous study. These supporting technologies work for user authentication purposes which is desirable for Fin-tech secure money transactions. User authentication is the first step for financial security. Table 9 shows all those features that use authentication technologies, which the biometrics, password, OTP, QR codes, MAC addresses, IMEI, artificial intelligence (A.I.) and machine learning are superior for the authentication process. User authentication from mobile money transactions is the current challenge for the researcher concerning the role of IMEI/MAC address and AI. The users can restrict mobile-based transactions through the sender's systematic transactions instead of manual sources. The application can be made by assigning privileges only and only to personal devices; if someone takes your required information, he will not be able to use your account, where the A.I. will learn and store the information tracks for experience in fraud detection. The IEMI and Mac address as a private key can address the security by successive interference cancellation (SIC) scheme in the dedication of smartphones [105]. These authentication technologies are generally implemented by all financial Organizations for specific operations. A.I. monitors the data to calculate the risk score based on previous activities to decide whether the transaction is genuine or fraudulent [106]. A.I. provides a high degree of security with its feature for a secure transaction using algorithms for clarification and verification [107]. The monitoring of chat and communication helps keep track [108]. It is helpful in cyber security for authentication [109]. To create geographically dispersed data and a history model provenance and lineage tracking trusted A.I. [110].

Table 9 The supporting technologies and features highlighted in the articles for the proposed System

Figure 6 represents the use case diagram to show the steps in baking finance transactions that make it easy for the operational team to fix the vulnerabilities in the fin-tech system. The user requires confidential information to log in to the account. Furthermore, strong security is the second authentication requirement for transaction defence upon the devices to get the biometric information. In the first step, enter the username and password, and the system verifies the username and password if it corrects the user's login to the system. If one of these is incorrect, the system denies accessing the account after the login the user authorized for the transaction. Still, in this case, the login user may be fake, so during the transaction, the system asks for the third factor of authentication in addition to a one-time password if the required authentication factor is a match to the bio matric information to the account holder the transaction will be done otherwise the process will be cancelled. The system will be kept store track of this operation for further A.I. implementation on this operation for risk detection.

Fig. 6
figure 6

User verification from use case diagram for transaction

Figure 7 represents the functional scenario in which the fraudsters tried to get confidential information in case of success during the transaction. The role of MFA in authentication is shown in Fig. 7. The alphabets ‘a’ represents the request message for confidential information fraud takes. In case ‘b’ is provided confidential information obtained by technical approach to the fraudster shown as ‘c’ is the implementation of that confidential information for the transaction. ‘d’ is the transaction authentication in the form of ‘g,’ ‘h,’ e is the trying for authentication, ‘I’ is for matching the authentication, ‘j’ is the acknowledgement for validation and ‘f’ represent the final decision could be transaction perform or cancellation. The consequences of the above Fig. 7 involve biometric authentication during a transaction that has not been used before and is essential for the physical authentication of the sender.

Fig. 7
figure 7

Money transaction scenario and challenges

Results and discussions

This secretin analyzed the previous study to achieve the literature study objectives to address the current problem. From the above research, the questions obtained the results for specific objectives achievement. This section provides the development, and the discussion will include all the final decision steps taken from the previous literature study. All the information directs the navigation systems in the availability of different hardware devices used by technologies to avoid the authentication issue to secure transactions.

To ensure the user is legitimate, what approaches are proposed for authentication in fin-tech secure money transfers?

The literature described multifactor authentication procedures to check the user's identity for financial transactions. Table 8 addresses the relevant problem to my study title, which mainly highlights financial security. To address that, security issues have been implemented to enhance the security system for financial transactions in which the biometric, OTP, GPRS, and physical device addresses are highlighted.

Table 10 Authentication for Transaction (AT) and Authentication for Control Access (ACA) concern the problem of achieving authentication objectives. Table 10 analyzes the technologies used by the previous researcher during the last article, as highlighted in Table 8. To classify the technologies for further calculation from both AT and ACA.

Table 10 Technologies used in the previous studies from Table 8 [12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44]

Table 11 has been used to classify the above technologies based on similarities for further analysis to include in the final decision. The Biometric or MFA consists of eleven articles, OTP or 2FA consists of 2 articles, Machine learning (ML) consists of two articles, block chain composed of 6 papers, and others comprised of 8 articles. These 22 articles included 92 articles analyzed for the proposed study. Furthermore, to calculate the values of technologies based on its paper belong to which categories to cross-check with Tables 8 and 10.

Table 11 Technologies classified based on their functions from Table 10

The above Fig. 8 shows the maximum and minimum technologies applied for protection in the previous study in which Biometric is 18% has been used for mobile money transaction purposes, which is the maximum some other unique procedures have been used.

Fig. 8
figure 8

Studies about technologies, problems, challenges, and results

What are the different features and factors used to develop take guarantee for secure transaction and user authentication in Fin-Tech?

The downloaded relevant articles contain supportive targets, technological software, or hardware tools mentioned in Table 11. The secure transaction could be secure with the help of authentication technologies. Usually, mobile technology authentication is a concern for identifying the legitimate user for allowing access to the account. The security-embedded system is helpful for the improvement of secure systems. The set of tools and technologies considered in the authentication security phase is recorded in Table 11.

What mechanisms/applications and supporting technologies have been applied in the previous system to avoid fraud in money transactions?

The user authentication functions against the authentication technologies. In case of account data loss, biometric authentication consists of some functions classified into some features to provide robust security to the user account based on technological approaches. The technological system can provide a secure environment for finance. The different functions shown in Table 11 help in user authentication from Table 10, Furthermore the improvement of technological security by transforming it into the financial sector for authentication and secure transaction.

The above Table 12. Shows the supporting technologies that provide a guideline for secure financial transition authentication. The combinations of different technologies related to their concern features address the security authentication problems. Seven features have been discussed with other technologies highlighted in the article and are mentioned as references.

Table 12 Supporting technologies for user authentication from Table 9

In Fig. 9 above, the user authentication supporting technologies has used that can be easily implemented on the Fin-Tech. Biometric use is 37%, QR code 21%, and OTP 12%, which shows the intention of the researcher to include new technology in Fin-Tech for money transaction security.

Fig. 9
figure 9

The supporting technologies used for user authentication

What requirements ensure the user's authentication before the money transfer to promote a reliable system to transform the expert system into fin-tech?

The consequences of a technology-based secure system are to check the compatibility of the available applications based on some performance suitable for authentication to secure mobile money transactions. This mechanism is ultimately used for application evaluation based on its functional capabilities and port abilities. The identification technologies from Tables 11 and 12 are the most compatible for financial security and more helpful for current and future challenges.

Future direction based on conference study

This study aims to identify relevant challenges and technologies based on mature conferences above the 10th, which consist of solid work and acceptable concepts for current challenges regarding the concern problems.

Table 13 shows the direction and trend that attract the researcher's attention to the concerns issues.

Table 13 Conference-based issues identification

Scope of the study

The scope of the study is calculated by the obtained studies based on the research questions using their keywords for desired information to achieve the research work's objectives that address the research problem.

The obtained information piece’s scope is based on its objective requirements. In Table 14, q is the symbol that represents individual objectives scope (S) is the value.

$$\mathrm{Unique value}=\forall :\sum_{\mathrm{n}=1}^{\mathrm{n}=5}{\mathrm{S}}_{\mathrm{n}}$$
(1)

where n is the number of combinations of scope values, the Eq. (1) represents the sum of any number of values out of the scope value must be unique, representing the individual combinational of objectives. The categories have been taken from the Table for further optimization. In Table 7, q1, q2, q3, q4, and q5 represent the scope value, T (Total) represents the sum of the importance of the questions, A is the number of articles contained in categories, ∏ is the product of A and T, and category percentile.

Table 14 Scope value Initialization to the objectives

(CAP). It has been used to calculate the percentile that shows the percentage, as shown in Table 14, the participation of the objectives taken from previous work.

$${\text{T}} = \sum\limits_{i = 1}^{i = 5} {{{\text{q}}_i}}$$
(2)

where i = 1, 2, … 5.

The Eq. (2) is the sum of the scope values shown in Table 15.

Table 15 Objectives-based categories analysis

Figure 10 above shows the achievements of the objective base on the extract from the number of articles reprinted by groups. The above Fig. 10 explains the result value of Table 15 calculated from the scope of questioner obtained by the articles. Table 14 identifies the objective's specific value depending on our study's scope. The uniqueness is represented by

Fig. 10
figure 10

Classification of similar objectives achievement

\(\mathrm{qi}\ne \mathrm{qj}\) where i \(\ne\) j.

Table 16 represents the overall calculation for results in which C1 to C8 are categories consisting of articles obtained from Table 7 represented by a group of technologies collected from previous technologies implemented. Table 14, where q1 to q5 is objectively obtained by the paper regarding or proposed study. The calculated values of the technologies are in Table 14 and Table 15 concerning the importance of categories of articles from Table 7. The maximum average value shows a higher ranking for achieving the objectives of the proposed study.

Table 16 Technologies concerns to the categories

Objectives achievement concerning technology

The technology has used articles belonging to which categories regarding concerns and objectives based on the questionnaire.

$$\mathrm{Xmn}=\begin{array}{c}{\mathrm{T}}_{1}\\ {\begin{array}{c}\vdots \\ T\end{array}}_{\mathrm{n}}\end{array}\left[\begin{array}{ccc}{\mathrm{C}}_{1}& ..\dots \dots ....& {\mathrm{C}}_{\mathrm{n}}\\ {\mathrm{X}}_{11}& \dots \dots ..& {\mathrm{X}}_{1\mathrm{n}}\\ & & \\ \vdots & \ddots & \vdots \\ {\mathrm{X}}_{\mathrm{m}1}& \dots \dots \dots .& {\mathrm{X}}_{\mathrm{mn}}\end{array}\right]$$
(3)

Technology Article ∈ Cn where 1 ≤ n ≤ 8.

Above Table 16 is the combined analysis of Tables 11 and 12 concerning categories in Tables 7, 14, and 15 of the article concerning the questioners.

The next step is to calculate the technologies' weightage concerns the proposed study from Table 16. Take CAP to multiply with quantity belonging to.

$${\mathrm{CAP}}_{\mathrm{l}} \times {\mathrm{X}}_{\mathrm{mn}}$$
(4)

where l, m, n = 1,2,3,…,8

$$\mathrm{Average} \left({\mathrm{Av}}_{\mathrm{i}}\right)={\sum }_{n=1}^{n=8}{C}_{n}$$
(5)
$$\mathrm{Weight }\left({\mathrm{WT}}_{\mathrm{i}}\right)=\frac{1}{{\sum }_{i=1}^{8}Avi}\times {\mathrm{Av}}_{\mathrm{i}}$$
(6)

To use the statistical aggregation supplied in the previous article [111].

The above Table 17. Represents the support of the technology in the proposed study regarding the objectives and its scope. The weight of the technology shows the role of authentication in the proposed research for the sender. In contrast, in some situations, two-factor authentication is failed in case of a lost password, and OTP, and the system will verify the person physically.

Table 17 The resulting weights of technologies concerning categories analysis

Figure 11Represents the weight of the technologies concern to the objectives in percentage in which the biometric is 36% concern to the proposed study in second OTP is 13% both are belonging to MFA and 2FAs and Qr Code is also in equal benefit which is now started in different areas but required to implement in the transaction for better security. Implementing both technologies can increase security by 49% from the current security.

Fig. 11
figure 11

Weights of the technologies in the propose study

Limitations

Regarding the proposed systematic literature, the highlighted limitations are:

  • Selection boundaries: this literature study relevant to the related domain address the proposed systematic review problem. The articles selection process has been done by limited sources where only five digital libraries were used in the search procedure for the literature study out of relevant research papers. Many other libraries are available for gathering relevant publications with some neglected information.

  • Duration: the proposed research work is prepared only the papers in the range of (2013–2022) in which the previous articles from 2013 are omitted from the analysis. The systematic research process has been selected from a limited range of publications. The proposed work gathers only the recent state-of-the-art approaches for the proposed financial security authentication.

  • Selection study: this systematic literature review excludes all the conference articles.

Advantages

The ignorance of the above limitations of the proposed research work caused by advantages are:

  • Analysis possibilities: the selection of the limited library sources, where the researchers focused on the high-level and famous publishers that contain all the detail about technology that is helpful for authentication, whereas the other published may not be extra information than these popular libraries, which is easy to analyze for the conclusion.

  • Recent work-study: the proposed research work has been prepared only from the latest article (2013–2022) that conflicts with the current issues.

  • Selection study: the systematic literature review excludes all the conference articles which are not primarily implementable.

Conclusion and future work

During the last decade, financial transactions through the internet faced security issues in which illegal money transactions used confidential steel information of legitimate users for money transactions. Fintech money transaction security has inspired the world by making financial transitions possible through intelligent apps that use user authentication to stop fraudsters from making illegal transactions. Authentication using smartphone devices is challenging research in this modern and vast technological era. The analysis was carried out by 92 articles downloaded from five publishers, where, because of the proposed study, 46 per cent of the studies highlighted authentication in the context of security, in which 54 per cent of the studies specifically about user authentication based on authentication factors for secure money transactions in Fin-Tech. Furthermore, in MFA, the biometric authentication after the OPT verification is concerning and extendable. Even though technology is improving, there are still problems with the security of money transactions.

The security can be more robust by allowing the transaction only from verified devices. Personal information can be hacked by fraudsters for illegal transactions. The password is not as considered a vital entity for protection. OTP makes it secure up to a specific limit. In case someone loses their password and OTP, the machine can detect the user based on the previous technology because only OTP a password is not enough for a machine to recognize a person. To address that type of security issue, another biometric technology must include during each transaction in which the system can verify a person's physical body, which is still not in use in the banking transaction system. The proposed study has identified the different technology Qr code and MFA for biometric authentication of users can increase by 49% the security from the current level of protection.

Furthermore, we can apply the A.I. technology to store the transaction tracks, behaviour, time situation, and result to keep the system proactive against uncertain situations to make the MFA technology more advanced.