Published October 13, 2023 | Version v1
Journal article Open

Analysis of potential risks of SMS-based authentication

Description

The pervasive use of mobile devices and the omnipresence of the Internet have ushered in a transformative era. Nearly everyone, regardless of age, possesses a mobile phone, bridging generational gaps in digital interaction. Mobile phones have become highly personal, with users guarding them zealously. Service providers recognize this intimate relationship, offering an opportunity to enhance security. Traditional password-based security is vulnerable to data breaches, prompting the adoption of mobile phones as a more robust platform for safeguarding digital assets. This shift has also facilitated the development of digital identification applications, reducing reliance on physical identity documents. Additionally, mobile banking applications are replacing physical payment cards, enabling secure transactions. The ascendancy of mobile payment solutions is diminishing the role of physical cash and wallets. In summary, mobile devices have reshaped security and daily activities, becoming the cornerstone of our digital existence, offering higher levels of security, convenience, and efficiency. 

Files

Analysis+of+potential+risks+of+SMS-based+authentication.pdf

Files (1.7 MB)

Additional details

Identifiers

ISSN
2956-8463

Dates

Submitted
2023-10-13
Accepted
2023-10-13

References

  • Babusabgari., Balakrishna B. (2021). Exposure and use of digital media among under-five children DOI: https://doi.org/10.18203/2349-3291.ijcp20213315
  • Dębskiego M., Bigaj M. (2019). Ogólnopolskie badanie Młodzi Cyfrowi [Polish national survey "Młodzi Cyfrowi"]. https://dbamomojzasieg.pl/wp-content/uploads/2019/11/Ogolnopolskie-badanie-Mlodzi-Cyfrowi.pdf
  • Sharma, Akash & Singh, Sunil & Kumar, Sudhakar & Chhabra, Anureet & Gupta, Saksham. (2023). Security of Android Banking Mobile Apps: Challenges and Opportunities. 10.1007/978-3-031-22018-0_39
  • Ruiz-Martínez, A., Sánchez-Martínez, D., Martínez-Montesinos, M., & F. Gómez-Skarmeta, A. (2007). A Survey of Electronic Signature Solutions in Mobile Devices. Journal of Theoretical and Applied Electronic Commerce Research, 2(3), 94–109. MDPI AG. Retrieved from http://dx.doi.org/10.3390/jtaer2030024
  • Katharina Buchholz (2021). The Most Popular Passwords Around the World https://www.statista.com/chart/16922/most-popular-passwords-2017-and-2018/
  • Aleksandra Grendys (2020). Raport: 89% wycieków danych w firmach to przypadki nieumyślne [Report: 89% of data leaks in companies are unintentional]. https://przemyslprzyszlosci.gov.pl/raport-89-wyciekow-danych-w-polskich-firmach-to-przypadki-nieum yslne/
  • Shukla, Anjali & Chavan, Sameer & R, Srivaramangai. (2023). Spear Watch: A Thorough Examination to Identify Spear Phishing Attacks. International Journal of Innovative Technology and Exploring Engineering. 12. 46-51. 10.35940/ijitee.H9680.0712823.
  • Liu, Enze & Rao, Sumanth & Havron, Sam & Ho, Grant & Savage, Stefan & Voelker, Geoffrey & Mccoy, Damon. (2023). No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Proceedings on Privacy Enhancing Technologies. 2023. 207-224. 10.56553/popets-2023-0013.
  • Grabowska B., Seń M., Klisowska I. (2021). E-prescription in Poland - a preliminary report. 151-156. doi:10.15503/emet2020.151.156.
  • Eysymontt, Małgorzata. (2022). The "mObywatel" application as a sign of the increase of informatisation of the Polish society – critical remarks on the practical applicability of the tool. Acta Iuridica Resoviensia. 38. 57-74. 10.15584/actaires.2022.3.4.
  • Albesher AS. Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites. Sustainability. 2023; 15(14):11043. https://doi.org/10.3390/su151411043
  • Natamiharja, Rudi. 2018. "A Case Study on Facebook Data Theft in Indonesia". Fiat Justisia: Jurnal Ilmu Hukum 12 (3):206-23. https://doi.org/10.25041/fiatjustisia.v12no3.1312
  • Snehal Manohar Awale | Dr. Praveen Gupta "Awareness of Sim Swap Attack" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4, June 2019, pp.995-997, URL: https://www.ijtsrd.com/papers/ijtsrd23982.pdf
  • Novanema D. (2021). Short Message Services (SMS) Fraud Against Mobile Telephone Provider Consumer Review From Law Number 8 Of 1999 Concerning Consumer Protection. Journal of Law Science. 3. 36-43. 10.35335/jls.v3i1.1654.
  • Reynolds J., Smith T., Reese K., Dickinson L., Ruoti S., Seamons K. (2018). A Tale of Two Studies: The Best and Worst of YubiKey Usability. 872-888. 10.1109/SP.2018.00067.