• Login
  • Help Guide
View Item 
  •   JOOUST IR Home
  • Theses & Dissertations
  • Masters Theses and Dissertations
  • School of Informatics & Innovative Systems
  • View Item
  •   JOOUST IR Home
  • Theses & Dissertations
  • Masters Theses and Dissertations
  • School of Informatics & Innovative Systems
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

An Integrated Mobile Identity Authentication Model

Thumbnail
View/Open
Abwao_An Integrated Mobile Identity Authentication Model.pdf (3.277Mb)
Publication Date
2023
Author
Abwao, Donatus Omondi
Type
Thesis
Metadata
Show full item record
Abstract/Overview

Personal identity theft is an illegal act that involves a perpetrator possessing an identity of a victim without their knowledge nor consent and in most cases for monetary gain or criminal fraudulent activities that the culprit hides in. Mobile identity has theft related cases where an identity theft criminal acquires a target person’s identity for his or her own advantage. Mobile identity theft still exists with many studies reporting despite increase of security measures from the industry and other public awareness on personal mobile security. This study identified mobile identity theft as a problem in the mobile phone industry data security, orchestrated by offenders who leverage on vulnerabilities at subscriber identity module (SIM) registration and replacement processes. The study finds that vulnerability at the subscriber identity module is a type of authentication process and besides the degree of problem isolation, categorizes the authentication clusters in their operational context. The study then proposed, developed and simulated the integrated authentication model to mitigate the problem by confirming that addition of an integrated population registration records would contribute to mitigate the problem. The study used model development methodology. The developed model was tested through a simulation process using data generated from constructs of the developed model passed through a formula that determines strength of authentication score and it was observed that maximum authentication was achieved at a maximum level of authentication for all parameters. The study also noted that the introduction of the IPRS, P enhanced the model and prevents any weakening of authentication. The study therefore confirmed that maximum level of stable authentication could be achieved by introducing an integrated population records to the already existing authentication model with maximum level of security. The study also pointed out that the security level of “user knows” and “user is” share similar authentication behavior implying that where static biometric authentication was used, knowledge-based authentication may not make much significance.

Subject/Keywords
Integrated Mobile Identity; Authentication Model
Publisher
JOOUST
Permalink
http://ir.jooust.ac.ke/handle/123456789/14106
Collections
  • School of Informatics & Innovative Systems [48]

Browse

All of JOOUST IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

Contact Us

Copyright © 2023-4 Jaramogi Oginga Odinga University of Science and Technology (JOOUST)
P.O. Box 210 - 40601
Bondo – Kenya

Useful Links

  • Report a problem with the content
  • Accessibility Policy
  • Deaccession/Takedown Policy

TwitterFacebookYouTubeInstagram

  • University Policies
  • Access to Information
  • JOOUST Quality Statement