A Two-Layer Authentication Security Through Personal Mobile SMS for KRG-Iraq E-Government System

Authors: Saman M. Abdullah1 & Musa M. Ameen2 & Sipan Asaad Ahmed3 & Alina Najdat Muhamad4
1Computer Engineering Department, Faculty of Engineering, Tishk International University, Erbil, Iraq
1Software Engineering Department, Faculty of Engineering, Koya University, Erbil, Iraq
2Computer Engineering Department, Faculty of Engineering, Tishk International University, Erbil, Iraq
3Computer Engineering Department, Faculty of Engineering, Tishk International University, Erbil, Iraq
4Computer Engineering Department, Faculty of Engineering, Tishk International University, Erbil, Iraq

Abstract: This work is presenting the design and implementation of a two-factor authentication login system using mobile SMS. The main aim of this project is to build, present and add new security layer for the E- Government websites of KRG-Iraq that proposed by the IT section in the KRG Ministry Council. The plan of KRG IT section is to tie individuals to do their works and activities formally over the KRG official websites. However, the login security of such websites should be controlled so that unauthorized users should not be able to access to data belonged to other users. This work follows the scenario-based software engineering that thoroughly developers can collect requirements, and accordingly, the proposed project could be designed and achieved correctly. The developed project has been tested based on reviewing ten software testers. The overall acceptability that obtained from the assigned software testers is 86.7%.

Keywords: Two-Layer Authentication, SMS Authentication, E-Government System Authentication

Download the PDF Document

Doi: 10.23918/eajse.v8i3p234

Published: January 3, 2023

References

Ali, G., Ally Dida, M., & Elikana Sam, A. (2020). Two-factor authentication scheme for mobile money: A review of threat models and countermeasures. Future Internet, 12(10), 160.

Amrutiya, V., Jhamb, S., Priyadarshi, P., & Bhatia, A. (2019). Trustless two-factor authentication using smart contracts in blockchains. Paper presented at the 2019 international conference on information networking (ICOIN).

Bardis, N. G., Doukas, N., Markovskyi, O. P., & Drigas, A. (2010). Two level efficient user authentication scheme. Paper presented at the 4th IEEE International Conference on Digital Ecosystems and Technologies.

Behera, R. K., Misra, M., Patro, A., & Roy, D. S. (2022). An Efficient Two-Wheeler Anti-Theft System Based on Three-Layer Architecture. In Advances in Communication, Devices and Networking, 393-403, Springer.

Cha, B.-R., Lee, S.-H., Park, S.-B., & Ji, G.-K. L. Y.-K. (2015). Design of micro-payment to strengthen security by 2 factor authentication with mobile & wearable devices. Advanced Science and Technology Letters, 109(7), 28-32.

Dmitrienko, A., Liebchen, C., Rossow, C., & Sadeghi, A.-R. (2014). SECURITY ANALYSIS OF MOBILE TWO- FACTOR AUTHENTICATION SCHEMES. Intel Technology Journal, 18(4).

Eldefrawy, M. H., Alghathbar, K., & Khan, M. K. (2011). OTP-based two-factor authentication using mobile phones. Paper presented at the 2011 eighth international conference on information technology: new generations.

Fang, X., & Zhan, J. (2010). Online banking authentication using mobile phones. Paper presented at the 2010 5th International Conference on Future Information Technology.

Iracleous, D., Moutsakis, K., & Efremidis, O. (2013). Performance of Web Services Security Mechanisms: Analysis and Evaluation. Journal of Applied Mathematics and Bioinformatics, 3(4), 107.

Kaviani, N., Hawkey, K., & Beznosov, K. (2003). A Two-factor Authentication Mechanism Using Mobile Phones. available at, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Technical report LERSSE-TR-2008-03, (Aug. 20, 2008).

KRG. (2020). Department of Information Technology. Retrieved from https://gov.krd/dit-en/ Shirvanian, M., & Agrawal, S. (2021). 2D-2FA: A new dimension in two-factor authentication. Paper presented at the Annual Computer Security Applications Conference.

Tirfe, D., & Anand, V. K. (2022). A survey on trends of two-factor authentication. In Contemporary Issues in Communication, Cloud and Big Data Analytics, 285-296, Springer.