dc.contributor.author | Abwao, Donatus | |
dc.contributor.author | Abeka, Silvance | |
dc.contributor.author | Agola, Joshua | |
dc.date.accessioned | 2022-04-26T08:42:51Z | |
dc.date.available | 2022-04-26T08:42:51Z | |
dc.date.issued | 2022-01 | |
dc.identifier.issn | 2581-3048 | |
dc.identifier.uri | http://ir.jooust.ac.ke:8080/xmlui/handle/123456789/10899 | |
dc.description.abstract | Theft of personal identity is an unlawful act; a criminal in this case possesses or attempts to be in possession of an identity of a victim without their knowledge or consent. Mobile identity theft the problem that inspires this study is just one of the types of identity theft and refers to having control of mobile subscriber identification through SIM card registration and replacement services again without the authority of the sole owner. This study provides a solution to solve a gap that is addressed by empirical studies from both academia and the industry for a problem that researchers feel should be a note issue in the twenty first century. The study besides interprets the course of mobile identity theft problem going by the literature reviewed to be orchestrated by criminals who leverage vulnerabilities at Subscriber Identity Module registration and replacement processes. The study then proposes, develops and tests an integrated authentication scheme based on existing models and inspired by theory of human identification to hypothesize that addition of Integrated population registration records would mitigate the problem. The simulation process of the proposed model is guided by an algorithm that employs a formula which determines strength of authentication score; using data generated by constructs of the scheme various results provide clarification on the safety of the model when various parameters are changed. The study observer’s a maximum authentication score at 96.43% when level of security is highest for all parameters in the new authentication model against that of 95.37% when security levels of the current authentication model are highest. The study hereby confirms that highest level of authentication can be achieved by introducing an integrated population records to the already existing authentication model while their levels of security are maximum. | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Research Journal of Innovations in Engineering and Technology (IRJIET) | en_US |
dc.subject | Subscriber Identity Module | en_US |
dc.subject | Integrated Authentication Model | en_US |
dc.subject | Mobile Network Operator | en_US |
dc.subject | ATM –Automatic Teller Machine | en_US |
dc.title | An Integrated Mobile Identity Authentication Model | en_US |
dc.type | Article | en_US |