RatHole: Authentication Algorithm for Controling Access to Mobile Phone File Management System

DOI: https://doi.org/10.33003/jobasr-2023-v1i1-19

Muhammad Samaila Kabir.

Oyenike Mary Olarenwaju.

Abubakar Mukhtar.

Abstract
Millions of Naira are being laundered by criminals through internet fraud, which deceives the victim with a false presentation, or hacking, which involves breaking information system security to steal financial information or data. Cybercrime, more specifically internet fraud, has become a common problem facing the world. In any case, this only occurred if the attacker was able to obtain the victim's account privileges (bank account, credit card information, or login credentials). This work presented an authentication technique that can be inexpensively implemented and used to create a secure architecture that is hard to breach. It can also reduce the amount of overhead that is placed on the authentication server during an attempt at authentication. The possibility of breaking the authentication technique was calculated using probability theory, and the mobile-based authentication algorithm was implemented using Android Studio. The result of this research shows the implementations of RatHole algorithm using android operating system which is file management android app that is being protected with RatHole algorithm and the probability of breaking down the algorithm for 1 to 10 authentication method keeps reducing by averagely 0.12. The implemented Rat-Hole on android devices also consumed 20 to 30 megabytes of data very less than memory consumption of recent research based on block chain solution which consumed 1 gigabyte to 50 gigabyte of memory.
References
Aloul, F., Zahidi, S., & W. E.-H. (2009, March 25). Multi Factor Authentication Using Mobile Phones. International Journal of Mathematics and Computer Science, 65–80. Retrieved from http://ijmcs.future-intech.net Hui, D. O., Yuen, K. K., Zahor, B. A., & al., e. (2016). An assessment of user authentication methods in mobile phones. Universiti Sains Malaysia, 11800 USM, Pulau Pinang: AIP Publishing. doi:10.1063/1.5055518 Ibrahim, T. M., Abdulhamid, S. M., & Alarood, A. A. (2019, September). Recent Advances in Mobile Touch Screen Security Authentication Methods: A Systematic Literature Review. African Scholars Journal of pure and Applied Science (JPAS-9), VOL. 15(NO. 9 ). Idrus, S. Z., Cherrier, E., Rosenberger, C., & Schwartzmann, J.-J. (2013, December 10). A Review on Authentication Methods. Journal of Basic and Applied Sciences, pp.95-107. Retrieved from https://hal.science/hal-00912435 Kim, S., Mun, H.-J., & Sunghyuck Hong 3,. (2022, 2 22). Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal. (L. J. Villalba, Ed.) journal of applied science. doi:10.3390/app12052301 Li, Y. (2019). On Enhancing Security of Password-Based Authentication. William & Mar y - Ar ts & Sciences , Department of Computer Science. W&M ScholarWorks. doi:DOI:10.21220/s2-j1wq-4306 Nath, A. (2016, January). Issues and Challenges in Two Factor Authentication Algorithms. International Journal of Latest Trends In engineering and Technology (IJLTET), 6(3). Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & 1, Y. K. (2018, 2 1). Multi-Factor Authentication: A Survey. journal of cryptography. doi:10.3390/cryptography2010001 Persson, O., & Wermelin, E. (n.d.). A Theoretical Proposal of Two-Factor Authentication in Smartphones. Faculty of Computing Blekinge Institute of Technology SE–371 79 Karlskrona, Sweden, Department of Computer Science. Pin Shen Teh Ning Zhang, S.-Y. Q. (2020). Strengthen user authentication on mobile devices by using user’s touch dynamics pattern. Journal of Ambient Intelligence and Humanized Computing (2020) 11:4019–4039 , 1-2. Roy, I., Hossain, A., & Rumee, S. T. (2021, December). Attacks on Graphical Password: A Study on Defense Mechanisms and Limitations. International Journal of Information Technology and Applied Sciences, 3(4). doi:DOI: 10.52502/ijitas.v3i4.201 Seung-hwanJu, Hee-sukSeo, Sung-hyuHan, JaecheolRyou, & JinKwak. (n.d.). A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information. BioMed ResearchInternational , Volume 2013. doi:10.1155/2013/427542 Silasai, O., & Khowfa, W. (2020, 05 18). The Study on Using Biometric Authentication on Mobile Device. International Journal of Science 2020; 17(1) : 90-110. TADE, O. (2013). A SPIRITUAL DIMENSION TO CYBERCRIME IN NIGERIA: THE ‘YAHOO PLUS’ doi:DOI: 10.2478/s13374-013-0158-9 Ullah, U., Faiz, R. B., & Haleem, M. (2022, July 6). Modeling and verification of authentication threats mitigation in aspect-oriented mal sequence woven model. doi:DOI:10.1371/journal.pone.0270702 Wang, C., Wang, Y., Chen, Y., Hongbo, L., & Jian, L. (2020). User Authentication on Mobile Devices: Approaches, Threats and Trends. journal of Computer Network, Volume 170. doi:10.1016/j.comnet.2020.107118 Zukarnain, Z. A., Muneer, A., & Aziz, M. K. (2022, April 14). Authentication Securing Methods for Mobile Identity: Issues, Solutions and Challenges. journal of symmatry. doi:10.3390/sym14040821
PDF