ENHANCING SECURITY OF MPESA TRANSACTIONS BY USE OF VOICE BIOMETRICS

  • Type: Project
  • Department: Management
  • Project ID: MGT0088
  • Access Fee: ₦5,000 ($14)
  • Pages: 154 Pages
  • Format: Microsoft Word
  • Views: 413
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

The main objective of this project is to improve the MPESA authentication process through the incorporation of a voice biometric functionality that enables the remote control of the individual MPESA accounts by MPESA subscribers with higher efficiency, accuracy and a higher level of authentication. The voice biometric is a state of the art technology that factors in authentication with better usability with the aim of combating fraud, self-service empowerment and cost savings through proper use of time and saving or reduction of administration costs for companies. The research study addressed the following objectives; to investigate the authentication schemes used by mobile money services; to investigate the major MPESA fraud techniques used in Kenya; to implement and analyse a time efficient, secure mobile-based multi-factor authentication scheme using device specific ID, voice biometric and a PIN for securing MPESA transactions.  A design science research was used that aimed at coming up with a voice biometric MPESA model which was developed and implemented to address the main problem of fraudulent MPESA transaction performed using SIM-swap method. The population of study were MPESA subscribers around Mirema-USIU area. The sample frame was drawn from the population of study. The research study adopted the purposing sampling techniques to enable selection of respondents who were only relevant to be sampled.

 

Collection of data was done via online Google Forms questionnaire survey and a descriptive method was used to carry out the data analysis. A total of thirty (32) questionnaires were sent to users via Google Forms online survey and all the questionnaires were duly filled in hence giving a response rate of 100%. The research design adopted quantitative techniques where data was analysed and presented in form of graphs and charts. The research also adopted a qualitative technique, where the individual views from respondents for example, their understanding of voice biometrics.

The findings regarding the first research study objective on investigating the authentication schemes used by mobile money services indicated that majority of respondents, 75% indicated that MPESA 4-digit PIN as a security measure is insufficient and 56.3% think that their PINs can easily be guessed. The study hence identified a big gap in the security of mobile money transactions in terms of using PIN as a security measure when performing mobile transactions. The study also indicated that majority of the respondents indicated that adding biometrics will improve MPESA security. The findings regarding the second research study objective on investigating the major MPESA fraud techniques used in Kenya revealed that there are different techniques are used by fraudsters these include reversal of transactions, unauthorized sim-swap, identity theft, erroneous transactions, scam messages and insider theft. The research study revealed that MPESA subscribers were aware of the fraud techniques used in their area which was mostly unauthorized SIM-swap and identity theft.

A model was developed on the android platform, VMPESA, to address issues regarding objective three, which aimed at implementing a secure mobile-based multi-factor authentication scheme using device specific ID, voice biometric and a PIN for securing MPESA transactions. 

The research concluded PIN is not a sufficient security measure when performing mobile transactions and fraudsters are taking advantage of this vulnerability to defraud MPESA subscribers by using techniques such as SIM-swap, reversal transactions and scam messages. Voice biometrics is a factor that can be used to achieve a high degree of benefits and advantages in lowering the risk within mobile financial systems with specific reference to MPESA mobile money transfer system

The study recommended that for mobile money service providers to provide safe and secure transactions, they should concentrate on implementing multi-factor authentication schemes in their system. They should also identify the major weaknesses of the implementing single factor authentication, such as PIN, as a security measure. Mobile money service providers should also be aware that fraudsters are employing new techniques everyday therefore continuous upgrade of the security features is imperative. Safeguarding subscriber personal information and account is extremely important and should be top priority to these organisations. 

Researchers should do further studies on alternative multifactor authentication schemes which have more functionalities to make the entire process more seamless, convenient for the subscribers and intelligent in nature. Further studies should be done to identify the advance techniques used by fraudsters to acquire subscribers’ personal information.

 

ENHANCING SECURITY OF MPESA TRANSACTIONS BY USE OF VOICE BIOMETRICS
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Management
  • Project ID: MGT0088
  • Access Fee: ₦5,000 ($14)
  • Pages: 154 Pages
  • Format: Microsoft Word
  • Views: 413
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Management
    Project ID MGT0088
    Fee ₦5,000 ($14)
    No of Pages 154 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT This dissertation mainly looked into all aspects of VoIP communications technology and information presented in preceding chapters, which build up a super frame work to discuss the conceptual design model and investigate features that could be incorporated for actual projects, with parameters that are tested on field values, the... Continue Reading
    ABSTRACT  This project report is an excerpt of the design of a Micro-controller based Access  Control Lock system implemented to assist the university with the aid of security  personnel in the prompt detection of students who have not completed necessary  fees payment and to checkmate the problem of the ever increasing rate of  examination... Continue Reading
    ABSTRACT Database security refers to protecting the database from user operations that, by their nature would compromise the integrity or security of the database. Some off these problems are caused by user carelessness for example; a user update leaving the database in the state violates one of its integrity constraints. Other problems are caused... Continue Reading
    ABSTRACT Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of... Continue Reading
    ABSTRACT Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of... Continue Reading
    ABSTRACT The performance of commercial banks in Kenya has been declining in the recent years evidenced by decline in return on assets and return on equity from 3.99 percent and 24.7 percent in 2016 to 3.5 percent and 22.5 percent in 2018. This trend indicates a challenge in the entire banking industry regarding profitability. Agency banking was... Continue Reading
    Abstract The study sought to evaluate the impact of periodically engaging forensic auditors to verify related party transactions in Zimbabwean banks, focusing on financial institutions listed on the ZSE. The study was motivated by the prevalence of bank failures that have been experienced in Zimbabwe between 2009 and 2013, where two banks were... Continue Reading
    CHAPTER ONE INTRODUCTION 1.1   BACKGROUND TO THE STUDY Issues of tax compliance have been a challenge for the successive government in Nigeria including various taxes on real estate property transaction. There are various taxes that apply to real... Continue Reading
    Voice Over Internet Protocol: This Project is basically on making calls over a local area Network... Continue Reading
    Voice Over Internet Protocol: This Project is basically on making calls over a local area Network... Continue Reading
    Call Us
    whatsappWhatsApp Us