Show simple item record

dc.contributor.authorAbwao, Donatus
dc.contributor.authorAbeka, Silvance
dc.contributor.authorAgola, Joshua
dc.date.accessioned2022-04-26T08:42:51Z
dc.date.available2022-04-26T08:42:51Z
dc.date.issued2022-01
dc.identifier.issn2581-3048
dc.identifier.urihttp://ir.jooust.ac.ke:8080/xmlui/handle/123456789/10899
dc.description.abstractTheft of personal identity is an unlawful act; a criminal in this case possesses or attempts to be in possession of an identity of a victim without their knowledge or consent. Mobile identity theft the problem that inspires this study is just one of the types of identity theft and refers to having control of mobile subscriber identification through SIM card registration and replacement services again without the authority of the sole owner. This study provides a solution to solve a gap that is addressed by empirical studies from both academia and the industry for a problem that researchers feel should be a note issue in the twenty first century. The study besides interprets the course of mobile identity theft problem going by the literature reviewed to be orchestrated by criminals who leverage vulnerabilities at Subscriber Identity Module registration and replacement processes. The study then proposes, develops and tests an integrated authentication scheme based on existing models and inspired by theory of human identification to hypothesize that addition of Integrated population registration records would mitigate the problem. The simulation process of the proposed model is guided by an algorithm that employs a formula which determines strength of authentication score; using data generated by constructs of the scheme various results provide clarification on the safety of the model when various parameters are changed. The study observer’s a maximum authentication score at 96.43% when level of security is highest for all parameters in the new authentication model against that of 95.37% when security levels of the current authentication model are highest. The study hereby confirms that highest level of authentication can be achieved by introducing an integrated population records to the already existing authentication model while their levels of security are maximum.en_US
dc.language.isoenen_US
dc.publisherInternational Research Journal of Innovations in Engineering and Technology (IRJIET)en_US
dc.subjectSubscriber Identity Moduleen_US
dc.subjectIntegrated Authentication Modelen_US
dc.subjectMobile Network Operatoren_US
dc.subjectATM –Automatic Teller Machineen_US
dc.titleAn Integrated Mobile Identity Authentication Modelen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record