46 research outputs found

    Development of a secure multi-factor authentication algorithm for mobile money applications

    Get PDF
    A Thesis Submitted in Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Information and Communication Science and Engineering of the Nelson Mandela African Institution of Science and TechnologyWith the evolution of industry 4.0, financial technologies have become paramount and mobile money as one of the financial technologies has immensely contributed to improving financial inclusion among the unbanked population. Several mobile money schemes were developed but, they suffered severe authentication security challenges since they implemented two-factor authentication. This study focused on developing a secure multi-factor authentication (MFA) algorithm for mobile money applications. It uses personal identification numbers, one-time passwords, biometric fingerprints, and quick response codes to authenticate and authorize mobile money subscribers. Secure hash algorithm-256, Rivest-Shamir-Adleman encryption, and Fernet encryption were used to secure the authentication factors, confidential financial information and data before transmission to the remote databases. A literature review, survey, evolutionary prototyping model, and heuristic evaluation and usability testing methods were used to identify authentication issues, develop prototypes of native genuine mobile money (G-MoMo) applications, and identify usability issues with the interface designs and ascertain their usability, respectively. The results of the review grouped the threat models into attacks against privacy, authentication, confidentiality, integrity, and availability. The survey identified authentication attacks, identity theft, phishing attacks, and PIN sharing as the key mobile money systems’ security issues. The researcher designed a secure MFA algorithm for mobile money applications and developed three native G-MoMo applications to implement the designed algorithm to prove the feasibility of the algorithm and that it provided robust security. The algorithm was resilient to non-repudiation, ensured strong authentication security, data confidentiality, integrity, privacy, and user anonymity, was highly effective against several attacks but had high communication overhead and computational costs. Nevertheless, the heuristic evaluation results showed that the G-MoMo applications’ interface designs lacked forward navigation buttons, uniformity in the applications’ menu titles, search fields, actions needed for recovery, and help and documentation. Similarly, the usability testing revealed that they were easy to learn, effective, efficient, memorable, with few errors, subscriber satisfaction, easy to use, aesthetic, easy to integrate, and understandable. Implementing a secure mobile money authentication and authorisation by combining multiple factors which are securely stored helps mobile money subscribers and other stakeholders to have trust in the developed native G-MoMo applications

    Heuristic Evaluation and Usability Testing of G-MoMo Applications

    Get PDF
    Financial technology (FinTech) has swiftly revolutionized mobile money as one of the ways of accessing financial services in developing countries. Numerous mobile money applications were developed to access mobile money services but are hindered by severe authentication security challenges, thus, forcing the researchers to design a secure multi-factor authentication (MFA) algorithm for mobile money applications. Three prototypes of native mobile money applications (G-MoMo applications) were developed to confirm that the algorithm provides high security and is feasible. This study, therefore, aimed to evaluate the usability of the G-MoMo applications using heuristic evaluation and usability testing to identify potential usability issues and provide recommendations for improvement. Heuristic evaluation and usability testing methods were used to evaluate the G-MoMo applications. The heuristic evaluation was carried out by five experts that used the 10 principles proposed by Jakob Nielsen with a five-point severity rating scale to identify the usability problems. While the usability testing was conducted with forty participants selected using a purposive sampling method to validate the usability of the G-MoMo applications by performing tasks and filling out the post-test questionnaire. Data collected were analyzed in RStudio software. Sixty-three usability issues were identified during heuristic evaluation, where 33 were minor and 30 were major. The most violated heuristic items were “help and documentation”, and “user control and freedom”, while the least violated heuristic items were “aesthetic and minimalist design” and “visibility of system status”. The usability testing findings revealed that the G-MoMo applications’ performance proved good in learnability, effectiveness, efficiency, memorability, and errors. It also provided user satisfaction, ease of use, aesthetics, usefulness, integration, and understandability. Therefore, it was highly recommended that the developers of G-MoMo applications fix the identified usability problems to make the applications more reliable and increase overall user satisfaction.info:eu-repo/semantics/publishedVersio

    Comparative Analysis of PWM AC Choppers with Different Loads with and Without Neural Network Application

    Get PDF
    In this paper, we focus on the "Artificial Neural Network (ANN) based PWM-AC chopper". This system is based on the PWM AC chopper-encouraged single-phase induction motor. The main purpose of this paper is to design and implement an ideal technique regarding speed control. Here analyzed PWM-based AC-AC converter with resistive load, R-L load and finally, the PWM AC chopper is fed to single phase induction for speed control. Using other soft computing and optimization techniques such as Artificial Neural Networks, Fuzzy Logic, Convolution algorithm, PSO, and Neuro Fuzzy can control the Speed. We used Artificial Neural Network to control the Speed of the PWM-AC Single phase induction motor drive. The Neural Network toolbox has been further used for getting desired responses. Neural system computer programs are executed in MATLAB. The performance of the proposed method of ANN system of PWM AC Chopper fed single phase induction motor drive is better than other traditional and base methods for controlling the Speed, based on the MOSFET

    Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda

    Get PDF
    This research article published by MDPI, 2020Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the usage and acceptance of mobile money has mostly been low due to security issues and challenges associated with the system. As a result, there is a need to carry out a survey to evaluate the key security issues associated with mobile money systems in Uganda. The study employed a descriptive research design, and stratified random sampling technique to group the population. Krejcie and Morgan’s formula was used to determine the sample size for the study. The collection of data was through the administration of structured questionnaires, where 741 were filled by registered mobile money (MM) users, 447 registered MM agents, and 52 mobile network operators’ (MNOs) IT officers of the mobile money service providers (MMSPs) in Uganda. The collected data were analyzed using RStudio software. Statistical techniques like descriptive analysis and Pearson Chi-Square test was used in data analysis and mean (M) > 3.0 and p-value < 0.05 were considered statistically significant. The findings revealed that the key security issues are identity theft, authentication attack, phishing attack, vishing attack, SMiShing attack, personal identification number (PIN) sharing, and agent-driven fraud. Based on these findings, the use of better access controls, customer awareness campaigns, agent training on acceptable practices, strict measures against fraudsters, high-value transaction monitoring by the service providers, developing a comprehensive legal document to run mobile money service, were some of the proposed mitigation measures. This study, therefore, provides a baseline survey to help MNO and the government that would wish to implement secure mobile money systems

    Design a Hybrid Approach for the Classification and Recognition of Traffic Signs Using Machine Learning

    Get PDF
    The automatic system for classifying traffic signs is a critical task of Advanced Driver Assistance Systems (ADAS) and a fundamental technique utilized as an integral part of the various vehicles. The recognizable features of a traffic image are utilized for their classification. Traffic signs are designed to contain specific shapes and colours, with some text and some symbols with high contrast to the background. This paper proposes a hybrid approach for classifying traffic signs by SIFT for image feature extraction and SVM for training and classification. The proposed work is divided into phases: pre-processing, Feature Extraction, Training, and Classification. MATLAB is used for the implementation purpose of the proposed framework, and classification is carried out by utilizing real traffic sign image

    Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures

    Get PDF
    This research article published by MDPI, 2020The proliferation of digital financial innovations like mobile money has led to the rise in mobile subscriptions and transactions. It has also increased the security challenges associated with the current two-factor authentication (2FA) scheme for mobile money due to the high demand. This review paper aims to determine the threat models in the 2FA scheme for mobile money. It also intends to identify the countermeasures to overcome the threat models. A comprehensive literature search was conducted from the Google Scholar and other leading scientific databases such as IEEE Xplore, MDPI, Emerald Insight, Hindawi, ACM, Elsevier, Springer, and Specific and International Journals, where 97 papers were reviewed that focused on the topic. Descriptive research papers and studies related to the theme were selected. Three reviewers extracted information independently on authentication, mobile money system architecture, mobile money access, the authentication scheme for mobile money, various attacks on the mobile money system (MMS), threat models in the 2FA scheme for mobile money, and countermeasures. Through literature analysis, it was found that the threat models in the 2FA scheme for mobile money were categorised into five, namely, attacks against privacy, attacks against authentication, attacks against confidentiality, attacks against integrity, and attacks against availability. The countermeasures include use of cryptographic functions (e.g., asymmetric encryption function, symmetric encryption function, and hash function) and personal identification (e.g., number-based and biometric-based countermeasures). This review study reveals that the current 2FA scheme for mobile money has security gaps that need to be addressed since it only uses a personal identification number (PIN) and a subscriber identity module (SIM) to authenticate users, which are susceptible to attacks. This work, therefore, will help mobile money service providers (MMSPs), decision-makers, and governments that wish to improve their current 2FA scheme for mobile money

    Innovative Livestock: A Survey of Artificial Intelligence Techniques in Livestock Farming Management

    Get PDF
    Modern technology has recently become a meaningful part of all life sectors, as software, sensors, smart machines, and expert systems are successfully integrated into the physical environment. This technology relies in its work on artificial intelligence techniques to make the right decisions at the right time. These technologies have a significant role in improving productivity, product quality, and industry outputs by significantly reducing human labour and errors that humans may cause. Artificial intelligence techniques are increasingly being integrated into animal husbandry and animal revolution management because they provide advantages and means that serve agriculturalists. These techniques monitor the emotional state of animals, milk production and herd management, feeding habits, the movement of animals, and their health status. AI-powered sensors can monitor the health of livestock and detect early signs of illness or stress to which they are exposed. Also, these techniques contribute to assisting agriculturalists in customising feeding programs, reducing waste, and improving product quality. This article will discuss the role of artificial intelligence techniques in animal control, farm management, disease surveillance, and sustainable resource optimisation practices

    Towards person-centered quality care for children with life-limiting and life-threatening illness: self-reported symptoms, concerns and priority outcomes from a multi-country qualitative study

    Get PDF
    Abstract Background: Paediatric life-limiting and life-threatening conditionslife-limiting conditions place significant strain on children, families and health systems. Given high service use among this population, it is essential that care addresses their main symptoms and concerns. Aim: This study aimed to identify the symptoms, concerns, and other outcomes that matter to children with life-limiting conditions and their families in sub-Saharan Africa.Setting and participants: Cross-sectional qualitative study in Kenya, Namibia, South Africa and Uganda. Children/caregivers of children aged 0-17 years with life-limiting conditions were purposively sampled by age, sex, and diagnosis. Children aged 7 and above self-reported; caregiver proxies reported for children below 7 and those aged 7 and above unable to self-report.Results: 120 interviews were conducted with children with life-limiting conditions (n=61 age range 7-17 years), and where self-report was not possible caregivers (n=59) of children (age range 0-17). Conditions included advanced HIV (22%), cancer (19%), heart disease (16%) endocrine, blood and immune disorders (13%), neurological conditions (12%), sickle cell anaemia (10%) and renal disease (8%). Outcomes identified included: physical concerns – pain and symptom distress; psycho-social concerns – family and social relationships, ability to engage with age-appropriate activities (e.g., play, school attendance); existential concerns – worry about death, and loss of ambitions,health care quality– child- and adolescent-friendly services. Priority psycho-social concerns and health service factors varied by age.Conclusion: This study bridges an important knowledge gap regarding symptoms, concerns and outcomes that matter to children living with life-limiting conditions and their families and informs service development and evaluation

    Proteolytic Processing of Interleukin-1 Family Cytokines: Variations on a Common Theme

    Get PDF
    Members of the extended interleukin-1 (IL-1) cytokine family, such as IL-1, IL-18, IL-33, and IL-36, play a pivotal role in the initiation and amplification of immune responses. However, deregulated production and/or activation of these cytokines can lead to the development of multiple inflammatory disorders. IL-1 family members share a broadly similar domain organization and receptor signaling pathways. Another striking similarity between IL-1 family members is the requirement for proteolytic processing in order to unlock their full biological potential. Although much emphasis has been put on the role of caspase-1, another emerging theme is the involvement of neutrophil- and mast cell-derived proteases in IL-1 family cytokine processing. Elucidating the regulation of IL-1 family members by proteolytic processing is of great interest for understanding inflammation and immunity. Here, we review the identity of the proteases involved in the proteolytic processing of IL-1 family cytokines and the therapeutic implications in inflammatory disease
    corecore