RatHole: Authentication Algorithm for Controling Access to Mobile Phone File Management System
DOI: https://doi.org/10.33003/jobasr-2023-v1i1-19
Muhammad Samaila Kabir.
Oyenike Mary Olarenwaju.
Abubakar Mukhtar.
Abstract
Millions of Naira are being laundered by criminals through internet fraud, which
deceives the victim with a false presentation, or hacking, which involves breaking
information system security to steal financial information or data. Cybercrime,
more specifically internet fraud, has become a common problem facing the world.
In any case, this only occurred if the attacker was able to obtain the victim's
account privileges (bank account, credit card information, or login credentials).
This work presented an authentication technique that can be inexpensively
implemented and used to create a secure architecture that is hard to breach. It can
also reduce the amount of overhead that is placed on the authentication server
during an attempt at authentication. The possibility of breaking the authentication
technique was calculated using probability theory, and the mobile-based
authentication algorithm was implemented using Android Studio. The result of
this research shows the implementations of RatHole algorithm using android
operating system which is file management android app that is being protected
with RatHole algorithm and the probability of breaking down the algorithm for 1
to 10 authentication method keeps reducing by averagely 0.12. The implemented
Rat-Hole on android devices also consumed 20 to 30 megabytes of data very less
than memory consumption of recent research based on block chain solution which
consumed 1 gigabyte to 50 gigabyte of memory.
References
Aloul, F., Zahidi, S., & W. E.-H. (2009, March 25). Multi
Factor Authentication Using Mobile Phones.
International Journal of Mathematics and Computer
Science, 65–80. Retrieved from http://ijmcs.future-intech.net
Hui, D. O., Yuen, K. K., Zahor, B. A., & al., e. (2016).
An assessment of user authentication methods in mobile
phones. Universiti Sains Malaysia, 11800 USM, Pulau
Pinang: AIP Publishing. doi:10.1063/1.5055518
Ibrahim, T. M., Abdulhamid, S. M., & Alarood, A. A.
(2019, September). Recent Advances in Mobile Touch
Screen Security Authentication Methods: A Systematic
Literature Review. African Scholars Journal of pure and
Applied Science (JPAS-9), VOL. 15(NO. 9 ).
Idrus, S. Z., Cherrier, E., Rosenberger, C., &
Schwartzmann, J.-J. (2013, December 10). A Review on
Authentication Methods. Journal of Basic and Applied
Sciences, pp.95-107. Retrieved from
https://hal.science/hal-00912435
Kim, S., Mun, H.-J., & Sunghyuck Hong 3,. (2022, 2 22).
Multi-Factor Authentication with Randomly Selected
Authentication Methods with DID on a Random
Terminal. (L. J. Villalba, Ed.) journal of applied science.
doi:10.3390/app12052301
Li, Y. (2019). On Enhancing Security of Password-Based
Authentication. William & Mar y - Ar ts & Sciences ,
Department of Computer Science. W&M ScholarWorks.
doi:DOI:10.21220/s2-j1wq-4306
Nath, A. (2016, January). Issues and Challenges in Two
Factor Authentication Algorithms. International Journal
of Latest Trends In engineering and Technology
(IJLTET), 6(3).
Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S.,
Mikkonen, T., & 1, Y. K. (2018, 2 1). Multi-Factor
Authentication: A Survey. journal of cryptography.
doi:10.3390/cryptography2010001
Persson, O., & Wermelin, E. (n.d.). A Theoretical
Proposal of Two-Factor Authentication in Smartphones.
Faculty of Computing Blekinge Institute of Technology
SE–371 79 Karlskrona, Sweden, Department of
Computer Science.
Pin Shen Teh Ning Zhang, S.-Y. Q. (2020). Strengthen
user authentication on mobile devices by using user’s
touch dynamics pattern. Journal of Ambient Intelligence
and Humanized Computing (2020) 11:4019–4039 , 1-2.
Roy, I., Hossain, A., & Rumee, S. T. (2021, December).
Attacks on Graphical Password: A Study on Defense
Mechanisms and Limitations. International Journal of
Information Technology and Applied Sciences, 3(4).
doi:DOI: 10.52502/ijitas.v3i4.201
Seung-hwanJu, Hee-sukSeo, Sung-hyuHan, JaecheolRyou, & JinKwak. (n.d.). A Study on User
Authentication Methodology Using Numeric Password
and Fingerprint Biometric Information. BioMed
ResearchInternational , Volume 2013.
doi:10.1155/2013/427542
Silasai, O., & Khowfa, W. (2020, 05 18). The Study on
Using Biometric Authentication on Mobile Device.
International Journal of Science 2020; 17(1) : 90-110.
TADE, O. (2013). A SPIRITUAL DIMENSION TO
CYBERCRIME IN NIGERIA: THE ‘YAHOO PLUS’ doi:DOI: 10.2478/s13374-013-0158-9
Ullah, U., Faiz, R. B., & Haleem, M. (2022, July 6).
Modeling and verification of authentication threats
mitigation in aspect-oriented mal sequence woven model.
doi:DOI:10.1371/journal.pone.0270702
Wang, C., Wang, Y., Chen, Y., Hongbo, L., & Jian, L.
(2020). User Authentication on Mobile Devices:
Approaches, Threats and Trends. journal of Computer
Network, Volume 170.
doi:10.1016/j.comnet.2020.107118
Zukarnain, Z. A., Muneer, A., & Aziz, M. K. (2022, April
14). Authentication Securing Methods for Mobile
Identity: Issues, Solutions and Challenges. journal of
symmatry. doi:10.3390/sym14040821
PDF