• Login
  • Help Guide
View Item 
  •   JOOUST IR Home
  • Journal Articles
  • School of Informatics & Innovative Systems
  • View Item
  •   JOOUST IR Home
  • Journal Articles
  • School of Informatics & Innovative Systems
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

An Integrated Mobile Identity Authentication Model

Thumbnail
View/Open
Abwao_ An Integrated Mobile Identity Authentication Model.pdf (281.9Kb)
Publication Date
2022-01
Author
Abwao, Donatus
Abeka, Silvance
Agola, Joshua
Type
Article
Metadata
Show full item record
Abstract/Overview

Theft of personal identity is an unlawful act; a criminal in this case possesses or attempts to be in possession of an identity of a victim without their knowledge or consent. Mobile identity theft the problem that inspires this study is just one of the types of identity theft and refers to having control of mobile subscriber identification through SIM card registration and replacement services again without the authority of the sole owner. This study provides a solution to solve a gap that is addressed by empirical studies from both academia and the industry for a problem that researchers feel should be a note issue in the twenty first century. The study besides interprets the course of mobile identity theft problem going by the literature reviewed to be orchestrated by criminals who leverage vulnerabilities at Subscriber Identity Module registration and replacement processes. The study then proposes, develops and tests an integrated authentication scheme based on existing models and inspired by theory of human identification to hypothesize that addition of Integrated population registration records would mitigate the problem. The simulation process of the proposed model is guided by an algorithm that employs a formula which determines strength of authentication score; using data generated by constructs of the scheme various results provide clarification on the safety of the model when various parameters are changed. The study observer’s a maximum authentication score at 96.43% when level of security is highest for all parameters in the new authentication model against that of 95.37% when security levels of the current authentication model are highest. The study hereby confirms that highest level of authentication can be achieved by introducing an integrated population records to the already existing authentication model while their levels of security are maximum.

Subject/Keywords
Subscriber Identity Module; Integrated Authentication Model; Mobile Network Operator; ATM –Automatic Teller Machine
Publisher
International Research Journal of Innovations in Engineering and Technology (IRJIET)
ISSN
2581-3048
Permalink
http://ir.jooust.ac.ke:8080/xmlui/handle/123456789/10899
Collections
  • School of Informatics & Innovative Systems [119]

Browse

All of JOOUST IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

Contact Us

Copyright © 2023-4 Jaramogi Oginga Odinga University of Science and Technology (JOOUST)
P.O. Box 210 - 40601
Bondo – Kenya

Useful Links

  • Report a problem with the content
  • Accessibility Policy
  • Deaccession/Takedown Policy

TwitterFacebookYouTubeInstagram

  • University Policies
  • Access to Information
  • JOOUST Quality Statement