Two-factor Authentication through Flash Calls: Technical and Economic Analysis
Keywords:
two-factor authentication, flash calls, telecommunication security, digital authentication, voice channel security, cryptographic verification, authentication protocols, telecommunications infrastructure, authentication costs, emerging markets securityAbstract
This study explores flash call verification as an innovative approach to two-factor authentication (2FA), addressing modern security and cost-efficiency challenges. The research examines the theoretical foundations and technical implementation of flash call authentication, comparing it against conventional SMS-based methods. The proposed methodology utilizes telephone network infrastructure to deliver authentication codes through incoming call numbers, showcasing notable improvements in both security and economic viability. Results indicate that flash calls offer substantial cost savings relative to SMS authentication, while preserving high-security standards through channel isolation. Although the method is particularly relevant for markets with elevated SMS costs, it holds global applicability in diverse digital systems. By providing a comprehensive analysis of flash call architecture, security mechanisms, and operational benefits, this study contributes new insights into scalable and cost-effective 2FA solutions.
References
. Current Cyber Threats: Q1 2024 //Positive Technologies, 2024. [Electronic resource]. Available at : https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-2024-q1/ (date of access: 11/19/2024)
. Ibrahim T. M. et al. Recent advances in mobile touch screen security authentication methods: A systematic literature review //Computers & Security. – 2019. – T. 85. – pp. 1-24. https://doi.org/10.1016/j.cose.2019.04.008
. Suleski T. et al. A review of multi-factor authentication in the Internet of Healthcare Things //Digital health. – 2023. – Vol. 9. https://doi.org/10.1177/20552076231177144
. Ekpezu A. O. et al. Biometric authentication schemes and methods on mobile devices: a systematic review //Modern Theories and Practices for Cyber Ethics and Security Compliance. – 2020. – pp. 172-192. https://doi.org/10.4018/978-1-7998-3149-5.ch011
. Velásquez I. Framework for the Comparison and Selection of Schemes for Multi-Factor Authentication //Clei Electronic Journal. – 2021. – Vol. 24. – No. 1. – P. 29. Available at: https://www.google.com/url?q=https://clei.org/cleiej/index.php/cleiej/article/download/485/392&sa=D&source=docs&ust=1739435524855203&usg=AOvVaw2-Bn7-dCnWRzD7aLU0jIZP
. Barkadehi M. H. et al. Authentication systems: A literature review and classification //Telematics and Informatics. – 2018. – Vol. 35. – No. 5. – pp. 1491-1511. Available at: https://www.academia.edu/download/58659909/Authentication_systems_SAR.pdf
. Samy M. A. et al. One-Time Password Authentication Techniques Survey //Data Mining and Knowledge Engineering. – 2017. – Vol. 9. – No. 4. – pp. 69-78. Available at: https://www.ciitresearch.org/dl/index.php/dmke/article/view/DMKE042017001.
. Fneish Z. A. A. M., El-Hajj M., Samrouth K. Survey on iot multi-factor authentication protocols: A systematic literature review //2023 11th International Symposium on Digital Forensics and Security (ISDFS). – IEEE, 2023. – pp. 1-7. https://doi.org/10.1109/ISDFS58141.2023.10131870
. Omas-As, R., Teleron, J. Enhancing Network Security: A Robust Network Access Control and Authentication Mechanism for Secure Data Transmission. International Journal of Advanced Research in Science, Communication and Technology, 2023. – Vol. 3. – No. 1. – pp. 182-187. https://doi.org/10.48175/ijarsct-14023.
. Use API gateways in microservices //Learn Microsoft, 2024. [Electronic resource]. Available at: https://learn.microsoft.com/en-us/azure/architecture/microservices/design/gateway (date of access: 11/19/2024)
. Make secure .NET Microservices and Web Applications //Learn Microsoft, 2023. [Electronic resource]. Available at: https://learn.microsoft.com/en-us/dotnet/architecture/microservices/secure-net-microservices-web-applications/ (date of access: 11/19/2024)
. Global Mobile Authentication Market: 2023-2028, 2023. [Electronic resource]. Available at: https://www.juniperresearch.com/research/telecoms-connectivity/messaging/mobile-authentication-research-report/ (accessed: 26.11.2024).
. Kamra J. Flash Calling: The cheaper, faster alternative to SMS verification, 2024. [Electronic resource]. Available at: https://www.symbio.global/resources/flash-calling-sms-alternative (accessed: 26.11.2024).
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Borovikov Evgeny

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who submit papers with this journal agree to the following terms.