Skip to main content

Four-Factor Authentication with Emerging Cybersecurity for Mobile Transactions

  • Conference paper
  • First Online:
Innovations in Cyber Physical Systems

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 788))

  • 1091 Accesses

Abstract

Cybersecurity is very much essential for Mobile Transactions to complete seamlessly. Mobile Commerce (Mcom.) is the very basic transaction type, which is very commonly used (two in five people use mobile as transaction medium). To secure this, there are various technologies used by this research. The four “factors” formally known as Multi-Factor-Authentication are: two of them are Traditional methods (User Login password and One Time Password (aka OTP)) with addition of Geolocation and Facial Recognition. All the data is converted to a text file, which is hidden in an image (using Babushka algorithm). The end-point then decrypts the image using the same algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ravi T, Sastry HG, Prateek M (2020) A novel protocol for information dissemination in vehicular networks. In: Lecture notes in computer science (Including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 11894. LNCS, Springer, Cham, pp 1–14

    Google Scholar 

  2. Tomar R, Prateek M, Sastry HG (2017) A Novel Approach to multicast in VANET using MQTT. Ada User J 38(4):231–235

    Google Scholar 

  3. Tomar R, Sastry H, Prateek M (2020) Establishing parameters for comparative analysis of V2V communication in VANET. J Sci Ind Res (JSIR) 79(01):26–29

    Google Scholar 

  4. Joshi T, Badoni P, Choudhury T, Aggarwal A (2019) Modification of Weiler-Atherton algorithm to address loose polygons. J Sci Ind Res 78:771–774

    Google Scholar 

  5. Choudhury T, Aggarwal A, Tomar R (2020) A deep learning approach to helmet detection for road safety. J Sci Ind Res (JSIR) 79(06):509–512

    Google Scholar 

  6. Kumar V, Choudhury T (2019) Real-time recognition of malignant skin lesions using ensemble modeling. J Sci Ind Res (JSIR) 78:148–153

    Google Scholar 

  7. Pyhton Documentation for Twilio, The Twilio Python Helper Library. https://twilio.com

  8. Sehrawat A, Choudhury TA, Raj G (2017) Surveillance drone for disaster management and military security. In: Proceeding—IEEE international conference on computing, communication and automation, ICCCA 2017. https://doi.org/10.1109/CCAA.2017.8229846

  9. Kumar S, Ravi T (2018) The role of artificial intelligence in space exploration. In: 2018 international conference on communication, computing and internet of things (IC3IoT). IEEE, pp 499–503

    Google Scholar 

  10. Bansal P, Aggarwal B, Tomar R (2019) Low-voltage multi-input high trans-conductance amplifier using flipped voltage follower and its application in high pass filter. In: 2019 international conference on automation, computational and technology management (ICACTM). IEEE, pp 525–529

    Google Scholar 

  11. Gupta SS, Thakral A, Choudhury T (2018) Social media security: analysis of threats and security measures. In: Proceedings on 2018 international conference on advances in computing and communication engineering, ICACCE 2018. https://doi.org/10.1109/ICACCE.2018.8441710

  12. Khurana M, Choudhury T, Malik P (2019) A review on network security challenges and the internet of things (IoT). In: Proceedings of the 4th international conference on contemporary computing and informatics, IC3I 2019. https://doi.org/10.1109/IC3I46837.2019.9055675

  13. Singh RK, Panchal VK, Singh BK (2019) Analysis of GA performance on its various parameters for solving travelling salesman NP-hard problem. Int J Comput Sci Eng 7(1):509–512. ISSN:2347–2693(UGC-63193)

    Google Scholar 

  14. Singh RK, Panchal VK, Singh BK (2019) Analysis of the various population sizes in genetic algorithm for solving N-queen NP-hard problem. Int J Res Electron Comput Eng IJRECE 7(1):564–566. ISSN:2393–9028(Print)| ISSN:2348–2281. (UGC(44816)

    Google Scholar 

  15. Singh BK, Luthra M (2019) MAHI as a sketching language. Int J Comput Sci Eng IJCSE 7(3):1102–1109. ISSN:2347–2693. (UGC-63193)

    Google Scholar 

  16. Mbunge E (2018) A robust and scalable four factor authentication architecture to enhance security for mobile online transaction

    Google Scholar 

  17. Matroschka algorithm or Babushka algorithm. https://github.com/samy280497/Matroschka

  18. SHA-256, Secured Hashmap algorithm. Wikipedia.org

    Google Scholar 

  19. XTEA Algorithm, eXtended TEA. Wikipedia.org

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravi Tomar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jain, S., Gautam, R., Sharma, S., Tomar, R., Choudhury, T. (2021). Four-Factor Authentication with Emerging Cybersecurity for Mobile Transactions. In: Singh, J., Kumar, S., Choudhury, U. (eds) Innovations in Cyber Physical Systems. Lecture Notes in Electrical Engineering, vol 788. Springer, Singapore. https://doi.org/10.1007/978-981-16-4149-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-4149-7_35

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-4148-0

  • Online ISBN: 978-981-16-4149-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics