Online Banking User Authentication Methods: A Systematic Literature Review

被引:0
|
作者
Karim, Nader Abdel [1 ]
Khashan, Osama Ahmed [2 ]
Kanaker, Hasan [3 ]
Abdulraheem, Waleed K. [4 ]
Alshinwan, Mohammad [5 ,6 ]
Al-Banna, Abedal-Kareem [7 ]
机构
[1] Al Balqa Appl Univ, Fac Artificial Intelligence, Dept Intelligent Syst, Al Salt 19117, Jordan
[2] Rabdan Acad, Res & Innovat Ctr, Abu Dhabi, U Arab Emirates
[3] Isra Univ, Cyber Secur Dept, Amman 11622, Jordan
[4] World Islamic Sci & Educ Univ, Informat Syst & Networks Dept, Amman 11947, Jordan
[5] Appl Sci Private Univ, Fac Informat Technol, Amman 11931, Jordan
[6] Middle East Univ, MEU Res Unit, Amman 11831, Jordan
[7] Univ Petra, AI & Data Sci Dept, Amman 11196, Jordan
关键词
User authentication; online banking; cyber threats; 2FA; MFA; cyber challenges; CYBER SECURITY; VULNERABILITY; CRYPTOGRAPHY; ATTACKS; SCHEME;
D O I
10.1109/ACCESS.2023.3346045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Online banking has become increasingly popular in recent years, making it a target for cyberattacks. Banks have implemented various user authentication methods to protect their customers' online accounts. This paper reviews the state-of-the-art user authentication methods used in online banking and potential cyber threats. This paper starts by exploring different user authentication methods, such as knowledge-based authentication (KBA), biometrics-based authentication (BBA), possession-based authentication (PBA), and other methods. The advantages and disadvantages of each user authentication method are then discussed. Furthermore, the paper discusses the various cyber threats that can compromise user authentication for online banking systems, such as malware attacks, social engineering, phishing attacks, man-in-the-middle (MiTM) attacks, denial of service (DoS) attacks, session hijacking, weak passwords, keyloggers, SQL injection, and replay attacks. Also, the paper explores the user authentication methods used by popular banks, which can provide insights into best practices for safeguarding online banking accounts and future user authentication methods in online banking and cyber threats. It states that the increasing use of BBA, two-factor authentication (2FA), and multi-factor authentication (MFA) will help improve the security of online banking systems. However, the paper also warns that new cyber challenges will emerge, and banks need to be vigilant in protecting their customers' online banking accounts.
引用
收藏
页码:741 / 757
页数:17
相关论文
共 50 条
  • [1] Authentication schemes and methods: A systematic literature review
    Velasquez, Ignacio
    Caro, Angelica
    Rodriguez, Alfonso
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2018, 94 : 30 - 37
  • [2] Evaluation of transaction authentication methods for online banking
    Kiljan, Sven
    Vranken, Harald
    van Eekelen, Marko
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 430 - 447
  • [3] Usable and secure? User perception of four authentication methods for mobile banking
    Kruzikova, Agata
    Knapova, Lenka
    Smahel, David
    Dedkova, Lenka
    Matyas, Vashek
    [J]. COMPUTERS & SECURITY, 2022, 115
  • [4] Understanding user participation in online communities: A systematic literature review of empirical studies
    Malinen, Sanna
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2015, 46 : 228 - 238
  • [5] Graphical User Authentication Algorithm for Mobile Banking User
    Ugochukwu, Ejike Ekeke Kingsley
    Jusoh, Yusmadi Yah
    Yasin, Sharifah Md
    Abdullah, Azizol
    Abdullah, Salfarina
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (07) : 5182 - 5186
  • [6] Adoption of and Satisfaction with Islamic Online Banking: A Literature Review
    Hati, Sri Rahayu Hijrah
    Dayana, Tasya Aldiary
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON FINANCIAL INNOVATION AND ECONOMIC DEVELOPMENT (ICFIED 2017), 2017, 34 : 140 - 143
  • [7] Recent advances in mobile touch screen security authentication methods: A systematic literature review
    Ibrahim, Tahir Musa
    Abdulhamid, Shafi'i Muhammad
    Alarood, Ala Abdusalam
    Chiroma, Haruna
    Al-garadi, Mohammed Ali
    Rana, Nadim
    Muhammad, Amina Nuhu
    Abubakar, Adamu
    Haruna, Khalid
    Gabralla, Lubna A.
    [J]. COMPUTERS & SECURITY, 2019, 85 : 1 - 24
  • [8] Watermarking approach for source authentication of web content in online social media: a systematic literature review
    Mohd Shaliyar
    Khurram Mustafa
    [J]. Multimedia Tools and Applications, 2024, 83 : 54027 - 54079
  • [9] Watermarking approach for source authentication of web content in online social media: a systematic literature review
    Shaliyar, Mohd
    Mustafa, Khurram
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (18) : 54027 - 54079
  • [10] A Systematic Review on Hadith Authentication and Classification Methods
    Binbeshr, Farid
    Kamsin, Amirrudin
    Mohammed, Manal
    [J]. ACM TRANSACTIONS ON ASIAN AND LOW-RESOURCE LANGUAGE INFORMATION PROCESSING, 2021, 20 (02)