Abstract
Cybersecurity is very much essential for Mobile Transactions to complete seamlessly. Mobile Commerce (Mcom.) is the very basic transaction type, which is very commonly used (two in five people use mobile as transaction medium). To secure this, there are various technologies used by this research. The four “factors” formally known as Multi-Factor-Authentication are: two of them are Traditional methods (User Login password and One Time Password (aka OTP)) with addition of Geolocation and Facial Recognition. All the data is converted to a text file, which is hidden in an image (using Babushka algorithm). The end-point then decrypts the image using the same algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ravi T, Sastry HG, Prateek M (2020) A novel protocol for information dissemination in vehicular networks. In: Lecture notes in computer science (Including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 11894. LNCS, Springer, Cham, pp 1–14
Tomar R, Prateek M, Sastry HG (2017) A Novel Approach to multicast in VANET using MQTT. Ada User J 38(4):231–235
Tomar R, Sastry H, Prateek M (2020) Establishing parameters for comparative analysis of V2V communication in VANET. J Sci Ind Res (JSIR) 79(01):26–29
Joshi T, Badoni P, Choudhury T, Aggarwal A (2019) Modification of Weiler-Atherton algorithm to address loose polygons. J Sci Ind Res 78:771–774
Choudhury T, Aggarwal A, Tomar R (2020) A deep learning approach to helmet detection for road safety. J Sci Ind Res (JSIR) 79(06):509–512
Kumar V, Choudhury T (2019) Real-time recognition of malignant skin lesions using ensemble modeling. J Sci Ind Res (JSIR) 78:148–153
Pyhton Documentation for Twilio, The Twilio Python Helper Library. https://twilio.com
Sehrawat A, Choudhury TA, Raj G (2017) Surveillance drone for disaster management and military security. In: Proceeding—IEEE international conference on computing, communication and automation, ICCCA 2017. https://doi.org/10.1109/CCAA.2017.8229846
Kumar S, Ravi T (2018) The role of artificial intelligence in space exploration. In: 2018 international conference on communication, computing and internet of things (IC3IoT). IEEE, pp 499–503
Bansal P, Aggarwal B, Tomar R (2019) Low-voltage multi-input high trans-conductance amplifier using flipped voltage follower and its application in high pass filter. In: 2019 international conference on automation, computational and technology management (ICACTM). IEEE, pp 525–529
Gupta SS, Thakral A, Choudhury T (2018) Social media security: analysis of threats and security measures. In: Proceedings on 2018 international conference on advances in computing and communication engineering, ICACCE 2018. https://doi.org/10.1109/ICACCE.2018.8441710
Khurana M, Choudhury T, Malik P (2019) A review on network security challenges and the internet of things (IoT). In: Proceedings of the 4th international conference on contemporary computing and informatics, IC3I 2019. https://doi.org/10.1109/IC3I46837.2019.9055675
Singh RK, Panchal VK, Singh BK (2019) Analysis of GA performance on its various parameters for solving travelling salesman NP-hard problem. Int J Comput Sci Eng 7(1):509–512. ISSN:2347–2693(UGC-63193)
Singh RK, Panchal VK, Singh BK (2019) Analysis of the various population sizes in genetic algorithm for solving N-queen NP-hard problem. Int J Res Electron Comput Eng IJRECE 7(1):564–566. ISSN:2393–9028(Print)| ISSN:2348–2281. (UGC(44816)
Singh BK, Luthra M (2019) MAHI as a sketching language. Int J Comput Sci Eng IJCSE 7(3):1102–1109. ISSN:2347–2693. (UGC-63193)
Mbunge E (2018) A robust and scalable four factor authentication architecture to enhance security for mobile online transaction
Matroschka algorithm or Babushka algorithm. https://github.com/samy280497/Matroschka
SHA-256, Secured Hashmap algorithm. Wikipedia.org
XTEA Algorithm, eXtended TEA. Wikipedia.org
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jain, S., Gautam, R., Sharma, S., Tomar, R., Choudhury, T. (2021). Four-Factor Authentication with Emerging Cybersecurity for Mobile Transactions. In: Singh, J., Kumar, S., Choudhury, U. (eds) Innovations in Cyber Physical Systems. Lecture Notes in Electrical Engineering, vol 788. Springer, Singapore. https://doi.org/10.1007/978-981-16-4149-7_35
Download citation
DOI: https://doi.org/10.1007/978-981-16-4149-7_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-4148-0
Online ISBN: 978-981-16-4149-7
eBook Packages: Computer ScienceComputer Science (R0)