AI-Enhanced Secure Mobile Banking System Utilizing Multi-Factor Authentication
DOI:
https://doi.org/10.52756/ijerr.2024.v45spl.012Keywords:
AI-Powered Security, Biometric Authentication, Cyber-attacks, Machine learning, Mobile Banking Security, Multi-Factor AuthenticationAbstract
The increasing reliance on mobile banking has significantly heightened the need for robust security mechanisms to protect users from unauthorized access and fraudulent activities. As mobile banking continues to grow in popularity, safeguarding financial transactions and personal data becomes a top priority. This paper introduces an AI-enhanced secure mobile banking system that leverages Multi-Phase Authentication (MPA) to strengthen the authentication process. In this system, artificial intelligence is integrated with traditional authentication methods, creating a dynamic framework that assesses the risk level associated with each user interaction. Based on this real-time risk assessment, the system adjusts the authentication requirements, making them more stringent when higher risks are detected and more lenient when the risk is lower. This adaptive mechanism not only enhances the security of mobile banking by providing multiple layers of protection but also improves the user experience by reducing unnecessary authentication steps that can cause frustration and delay. The proposed system's effectiveness is validated through a series of simulations and case studies, which demonstrate significant improvements in key security metrics. These include a marked reduction in instances of fraud and lower false positive rates, which indicate that the system can accurately distinguish between legitimate and suspicious activities without imposing undue burden on users. Overall, the results of this study highlight the potential of AI-enhanced multi-phase authentication to provide a scalable and user-friendly solution for secure mobile banking. This approach represents a promising direction for the future of digital financial services, offering a balance between rigorous security and seamless user experience.
References
Ahmad, M. O., Tripathi, G., Siddiqui, F., Alam, M. A., Ahad, M. A., Akhtar, M. M., & Casalino, G. (2023). BAuth-ZKP—A blockchain-based multi-factor authentication mechanism for securing smart cities. Sensors, 23(5), 2757. https://doi.org/10.3390/s23052757 DOI: https://doi.org/10.3390/s23052757
Ali, G., Ally Dida, M., & Elikana Sam, A. (2020). Two-factor authentication scheme for mobile money: A review of threat models and countermeasures. Future Internet, 12(10), 160. https://doi.org/10.3390/fi12100160 DOI: https://doi.org/10.3390/fi12100160
AliBabaee, A., & Broumandnia, A. (2018). Biometric authentication of fingerprint for banking users, using stream cipher algorithm. Journal of Advances in Computer Research, 9(4), 1–17.
Alzu’bi, A., Albalas, F., Al-Hadhrami, T., Younis, L. B., & Bashayreh, A. (2021). Masked face recognition using deep learning: A review. Electronics, 10(21), 2666. https://doi.org/10.3390/electronics10212666 DOI: https://doi.org/10.3390/electronics10212666
Balani, V., Kharya, C., Shivhare, S. N., & Singh, T. P. (2024). An Enhanced RSA Algorithm to Counter Repetitive Ciphertext Threats Empowering User-centric Security. Scalable Computing: Practice and Experience, 25(6), 4669–4682. https://doi.org/10.12694/scpe.v25i6.3386 DOI: https://doi.org/10.12694/scpe.v25i6.3386
Benli, M. (2020). External debt burden–economic growth nexus in Turkey. Sosyal Bilimler Ara?t?rma Dergisi, 9(1), 107–116.
Chaudhry, S. A., Farash, M. S., Naqvi, H., & Sher, M. (2016). A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electronic Commerce Research, 16, 113–139. https://doi.org/10.1007/s10660-015-9192-5 DOI: https://doi.org/10.1007/s10660-015-9192-5
Dasgupta, D., Roy, A., & Nag, A. (2016). Toward the design of adaptive selection strategies for multi-factor authentication. Computers & Security, 63, 85–116. https://doi.org/10.1016/j.cose.2016.09.004 DOI: https://doi.org/10.1016/j.cose.2016.09.004
Elliot, M., & Talent, K. (2018). A robust and scalable four factor authentication architecture to enhance security for mobile online transaction. Int. J. Sci. Technol. Res., 7(3), 139–143.
Harish, Vijayan, S., Mangold, N., & Bhardwaj, A. (2020). Water?Ice Exposing Scarps Within the Northern Midlatitude Craters on Mars. Geophysical Research Letters, 47(14), e2020GL089057. https://doi.org/10.1029/2020GL089057 DOI: https://doi.org/10.1029/2020GL089057
Houngbo, P. J., Hounsou, J. T., Damiani, E., Asal, R., Cimato, S., Frati, F., & Yeun, C. Y. (2019). Embedding a digital wallet to pay-with-a-selfie, from functional requirements to prototype. Emerging Technologies for Developing Countries: Second EAI International Conference, AFRICATEK 2018, Cotonou, Benin, May 29–30, 2018, Proceedings 2, 47–56. https://doi.org/10.1007/978-3-030-05198-3_4 DOI: https://doi.org/10.1007/978-3-030-05198-3_4
Huseynov, E., & Seigneur, J.-M. (2017). Context-aware multifactor authentication survey. Computer and Information Security Handbook, 715–726. https://doi.org/10.1016/B978-0-12-803843-7.00050-8 DOI: https://doi.org/10.1016/B978-0-12-803843-7.00050-8
Ibrahim, R. M. (2018). A review on online-banking security models, successes, and failures. Proceedings of the 2018 International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), Tamil Nadu, India, 28–29.
James, T. S., & Garnett, H. A. (2024). The determinants of electoral registration quality: A cross-national analysis. Representation, 60(2), 279–302. https://doi.org/10.1080/00344893.2023.2207194 DOI: https://doi.org/10.1080/00344893.2023.2207194
Kanimozhi, G., & Kamatchi, K. S. (2017). Security aspects of mobile based E wallet. International Journal on Recent and Innovation Trends in Computing and Communication, 5(6), 1223–1228.
Khan, H. U., Sohail, M., Nazir, S., Hussain, T., Shah, B., & Ali, F. (2023). Role of authentication factors in Fin-tech mobile transaction security. Journal of Big Data, 10(1), 138. https://doi.org/10.1186/s40537-023-00807-3 DOI: https://doi.org/10.1186/s40537-023-00807-3
Massaro, A., & Galiano, A. (2020). Image Processing and Post-Data Mining Processing for Security in Industrial Applications: Security in Industry. IGI Global, In Handbook of Research on Intelligent Data Processing and Information Security Systems, pp. 117–146. https://doi.org/10.4018/978-1-7998-1290-6.ch006 DOI: https://doi.org/10.4018/978-1-7998-1290-6.ch006
Mostafa, A. M., Ezz, M., Elbashir, M. K., Alruily, M., Hamouda, E., Alsarhani, M., & Said, W. (2023). Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication. Applied Sciences, 13(19), 10871. https://doi.org/10.3390/app131910871 DOI: https://doi.org/10.3390/app131910871
Nwabueze, E. E., Obioha, I., & Onuoha, O. (2017). Enhancing multi-factor authentication in modern computing. Communications and Network, 6(03), 172. https://doi.org/10.4236/cn.2017.63012 DOI: https://doi.org/10.4236/cn.2017.63012
Polas, M. R. H., Jahanshahi, A. A., Kabir, A. I., Sohel-Uz-Zaman, A. S. M., Osman, A. R., & Karim, R. (2022). Artificial intelligence, blockchain technology, and risk-taking behavior in the 4.0 IR Metaverse Era: evidence from Bangladesh-based SMEs. Journal of Open Innovation: Technology, Market, and Complexity, 8(3), 168. https://doi.org/10.3390/joitmc8030168 DOI: https://doi.org/10.3390/joitmc8030168
Sharma, L., & Mathuria, M. (2018). Mobile banking transaction using fingerprint authentication. 2018 2nd International Conference on Inventive Systems and Control (ICISC), 1300–1305. https://doi.org/10.1109/ICISC.2018.8399016 DOI: https://doi.org/10.1109/ICISC.2018.8399016
Skra?i?, K., Pale, P., & Kostanj?ar, Z. (2017). Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets. Computers & Security, 67, 107–121. https://doi.org/10.1016/j.cose.2017.03.002 DOI: https://doi.org/10.1016/j.cose.2017.03.002
Tan, S. F., & Samsudin, A. (2018). Enhanced security of internet banking authentication with extended honey encryption (XHE) scheme. Innovative Computing, Optimization and Its Applications: Modelling and Simulations, 201–216. https://doi.org/10.1007/978-3-319-66984-7_12 DOI: https://doi.org/10.1007/978-3-319-66984-7_12
Tellini, N., & Vargas, F. (2017). Two-Factor Authentication: Selecting and implementing a two-factor authentication method for a digital assessment platform.
Vengatesan, K., Kumar, A., Eknath, K. H., Samee, S., Vincent, R., & Ambeth Kumar, V. D. (2020). Intrusion detection framework using efficient spectral clustering technique. IOS Press, In Intelligent Systems and Computer Technology, pp. 98–103. https://doi.org/10.3233/APC200125 DOI: https://doi.org/10.3233/APC200125
Vengatesan, K., Kumar, A., & Parthibhan, M. (2020). Advanced Access Control Mechanism for Cloud Based E-Wallet. Springer International Publishing: Berlin/Heidelberg, Germany.
Wang, C., Wang, Y., Chen, Y., Liu, H., & Liu, J. (2020). User authentication on mobile devices: Approaches, threats and trends. Computer Networks, 170, 107118. https://doi.org/10.1016/j.comnet.2020.107118 DOI: https://doi.org/10.1016/j.comnet.2020.107118
Wang, Z., Zhang, X., Yu, P., Duan, W., Zhu, D., & Cao, N. (2020). A new face recognition method for intelligent security. Applied Sciences, 10(3), 852. https://doi.org/10.3390/app10030852 DOI: https://doi.org/10.3390/app10030852
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Academic Publishing House (IAPH)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.