Loading...
Nigeria: Cyber Space Security vis a vis Computerisation, Miniaturisation and Location-Based Authentication
Adeka, Muhammad I. ; Ngala, Mohammad J. ; Bin-Melha, Mohammed S. ; Ibrahim, Embarak M. ; Shepherd, Simon J. ; Elfergani, Issa T. ; Hussaini, Abubakar S. ; Elmegri, Fauzi ;
Adeka, Muhammad I.
Ngala, Mohammad J.
Bin-Melha, Mohammed S.
Ibrahim, Embarak M.
Shepherd, Simon J.
Elfergani, Issa T.
Hussaini, Abubakar S.
Elmegri, Fauzi
Publication Date
2015
End of Embargo
Supervisor
Rights
Peer-Reviewed
Yes
Open Access status
Accepted for publication
Institution
Department
Awarded
Embargo end date
Additional title
Abstract
The degree of insecurity occasioned by fraudulent practices in
Nigeria has been of great concern economically, especially as it relates to
overseas transactions. This paper was designed to mitigate this problem for
Nigeria and countries with similar dispositions. Based on a survey involving
field trip to Nigeria, the paper examines the general security situation in
Nigeria and its mutual impacts with computerisation, miniaturisation and
Location-Based Authentication (LBA). It was discovered that both
computerisation and miniaturisation had some negative effects on cybersecurity,
as these were being exploited by fraudsters, especially using
‘advance fee fraud;’ popularly called 419. As a countermeasure, the research
examined the possibility of using LBA and further digitisation of the GSM
Mobile country codes down to City/Area codes along with GSM
Mobile/Global Positioning System (GPS) authentications. Where necessary,
these could be combined with the use of a web-based Secret Sharing Scheme
for services with very high security demands. The anticipated challenges were
also examined and considered to be of negligible impacts; especially roaming.
Version
No full-text in the repository
Citation
Adeka MI, Ngala M, Bin-Melha M et al (2015) Nigeria: Cyber Space Security vis a vis Computerisation, Miniaturisation and Location-Based Authentication. In: Mumtaz S, Rodriguez J, Katz M et al (Eds.) Wireless Internet. WICON 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol 146. Springer, Cham.
Link to publisher’s version
Link to published version
Link to Version of Record
Type
Conference paper