SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Whitepaper                  Problems with SMS based Authentication


                                   SMS based Authentication approach is fundamentally flawed because
                                   of the following reasons:


                                   Delay in delivery of SMS

                                   Although most SMS text messages are transmitted in seconds, it's common
                                   to find them delayed when networks become congested. SMS traffic is not
                                   sent point to point, it is queued and then sent on to the required network
What RBI has to say                cell where it is again queued and finally sent to the end users phone. This
regarding SMS OTP?                 queuing gives rise to delays at peak operator periods. Also it is not infrequent
                                   to hear complaints from users of SMS based authentication that they got
Key feedback received from
                                   their SMS delayed by few hours. Add to this complication, there will be a
customers of SMS OTP is that
                                   session time-out of few minutes for application to authenticate/transaction
it leads to several issues or
inconvenience due to factors       to happen. Considering 4% of users trying to authenticate will fail and will
like network availability,         need to raise a help desk call to gain emergency access. Thus for a
restriction to a particular        deployment of 10000 users authenticating each day, 400 help desk calls
phone number, non-                 would be raised per day!
availability of the service when
customer travels abroad,           No Coverage Areas
timing out of online
                                   Mobile phone signals are not always available particularly in buildings with
transactions due to slow
                                   wide outer walls, in underground basements or in computer rooms that give
speed of OTP transmission etc.
                                   off high RF noise. Consider a user trying to authenticate in one of these
                                   locations. When they fail to receive their authentication code, they would
                                   next need to move to a location that has a signal, receive their
                                   authentication code, move back to the original location to enter their OTP
                                   (One Time Password) ALL with-in a timeout period of 2 minutes. Users
                                   located within these locations would have no alternative than to raise help
                                   desk calls to gain emergency access.

                                   Unavailability of Mobile Phone

                                   There might be cases where-in the user has forgot mobile phone
                                   somewhere, user has lost his mobile phone, the battery goes down for the
                                   mobile phone or the mobile number has changed but not updated. In all this
                                   cases, the continuity of access to application will get affected adversely.
                                   Some studies have shown that over 50% of mobile users misplace/forget
                                   their mobiles at least once in a month. All these amount to increased help
                                   desk and support calls.
Problems with SMS based Authentication - Whitepaper



                                  Low level of Security

                                  There are also potential security issues with the SMS-OTP. Firstly, all the
                                  mobile phone operators between the service provider and user become part
                                  of the trust chain and thus need to be trusted. In case of roaming there are
                                  multiple operators. Secondly, SMS encryption can be decrypted by an
                                  attacker and therefore SMS-OTP cannot be totally.
What Standard Chartered
bank      website  says           Downtime with SMS Gateway
regarding SMS OTP?                Whenever SMS gateway is under maintenance or facing issues, the
                                  timeliness of SMS delivery gets affected. Also similar situation can arise when
- There may be some service
                                  there is Service Outage of Operator Networks.
delays or interruptions by your
mobile service providers.
                                  Unavailability of service for roaming user
Delays could arise due to high
SMS load e.g. festive seasons,    When customer travels abroad, based on operator there will be a restriction
service outage, earthquakes       on availability of service. In those cases, the user will be denied access to the
etc                               application and has to go for emergency help desk calls.

- Your mobile phone may be        High Cost for roaming user
out of network coverage.
Please check the signal           Even in case service is available for some countries, the roaming cost per
strength on your phone.           SMS will make the TCO of the system very high. The same has to be factored
                                  in while calculating the TCO and ROI of the system.
- You will not be able to
receive SMS if you are located    Dependency on Government Regulations
in Japan or Korea or Indonesia
                                  In emergency and sensitive situations, governments can dictate blockage of
and your mobile phone is
                                  bulk SMS there by effecting the service of SMS based authentication
roaming in these countries.
                                  methods. Similar situation has been evidenced in 2010 when government
                                  has called for blocking of all bulk SMS during a court hearing on a sensitive
                                  subject.

                                  Mobile phone is used to connect to the internet

                                  In cases when a mobile phone creates a data connection it can't receive SMS
                                  messages and user might not be aware of this situation in most cases. Users
                                  trying to utilize their mobile phone as a way of connecting to the Internet
                                  would not receive their authentication code until they hang-up the data
                                  connection.




                                                                                                           Page 2
Problems with SMS based Authentication - Whitepaper




Conclusion
Organizations looking at implementing Two Factor authentication solution
should take due care that the above factors are considered while evaluating
SMS based authentication solutions when compared with other forms of
Two Factor authentication.




                                         ABOUT ARRAYSHIELD
Array Shield Technologies is the maker of software security products in the
area of Multi-Factor Authentication. The company’s mission is to provide
highly secure, cost effective and easy to use software security solutions
globally.

For more information, visit us at www.arrayshield.com




                                                                      Page 3

Mais conteúdo relacionado

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Destaque

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Problems with SMS based Authentication

  • 1. Whitepaper Problems with SMS based Authentication SMS based Authentication approach is fundamentally flawed because of the following reasons: Delay in delivery of SMS Although most SMS text messages are transmitted in seconds, it's common to find them delayed when networks become congested. SMS traffic is not sent point to point, it is queued and then sent on to the required network What RBI has to say cell where it is again queued and finally sent to the end users phone. This regarding SMS OTP? queuing gives rise to delays at peak operator periods. Also it is not infrequent to hear complaints from users of SMS based authentication that they got Key feedback received from their SMS delayed by few hours. Add to this complication, there will be a customers of SMS OTP is that session time-out of few minutes for application to authenticate/transaction it leads to several issues or inconvenience due to factors to happen. Considering 4% of users trying to authenticate will fail and will like network availability, need to raise a help desk call to gain emergency access. Thus for a restriction to a particular deployment of 10000 users authenticating each day, 400 help desk calls phone number, non- would be raised per day! availability of the service when customer travels abroad, No Coverage Areas timing out of online Mobile phone signals are not always available particularly in buildings with transactions due to slow wide outer walls, in underground basements or in computer rooms that give speed of OTP transmission etc. off high RF noise. Consider a user trying to authenticate in one of these locations. When they fail to receive their authentication code, they would next need to move to a location that has a signal, receive their authentication code, move back to the original location to enter their OTP (One Time Password) ALL with-in a timeout period of 2 minutes. Users located within these locations would have no alternative than to raise help desk calls to gain emergency access. Unavailability of Mobile Phone There might be cases where-in the user has forgot mobile phone somewhere, user has lost his mobile phone, the battery goes down for the mobile phone or the mobile number has changed but not updated. In all this cases, the continuity of access to application will get affected adversely. Some studies have shown that over 50% of mobile users misplace/forget their mobiles at least once in a month. All these amount to increased help desk and support calls.
  • 2. Problems with SMS based Authentication - Whitepaper Low level of Security There are also potential security issues with the SMS-OTP. Firstly, all the mobile phone operators between the service provider and user become part of the trust chain and thus need to be trusted. In case of roaming there are multiple operators. Secondly, SMS encryption can be decrypted by an attacker and therefore SMS-OTP cannot be totally. What Standard Chartered bank website says Downtime with SMS Gateway regarding SMS OTP? Whenever SMS gateway is under maintenance or facing issues, the timeliness of SMS delivery gets affected. Also similar situation can arise when - There may be some service there is Service Outage of Operator Networks. delays or interruptions by your mobile service providers. Unavailability of service for roaming user Delays could arise due to high SMS load e.g. festive seasons, When customer travels abroad, based on operator there will be a restriction service outage, earthquakes on availability of service. In those cases, the user will be denied access to the etc application and has to go for emergency help desk calls. - Your mobile phone may be High Cost for roaming user out of network coverage. Please check the signal Even in case service is available for some countries, the roaming cost per strength on your phone. SMS will make the TCO of the system very high. The same has to be factored in while calculating the TCO and ROI of the system. - You will not be able to receive SMS if you are located Dependency on Government Regulations in Japan or Korea or Indonesia In emergency and sensitive situations, governments can dictate blockage of and your mobile phone is bulk SMS there by effecting the service of SMS based authentication roaming in these countries. methods. Similar situation has been evidenced in 2010 when government has called for blocking of all bulk SMS during a court hearing on a sensitive subject. Mobile phone is used to connect to the internet In cases when a mobile phone creates a data connection it can't receive SMS messages and user might not be aware of this situation in most cases. Users trying to utilize their mobile phone as a way of connecting to the Internet would not receive their authentication code until they hang-up the data connection. Page 2
  • 3. Problems with SMS based Authentication - Whitepaper Conclusion Organizations looking at implementing Two Factor authentication solution should take due care that the above factors are considered while evaluating SMS based authentication solutions when compared with other forms of Two Factor authentication. ABOUT ARRAYSHIELD Array Shield Technologies is the maker of software security products in the area of Multi-Factor Authentication. The company’s mission is to provide highly secure, cost effective and easy to use software security solutions globally. For more information, visit us at www.arrayshield.com Page 3