International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 187 - Number 7 |
Year of Publication: 2025 |
Authors: Umesh Kumar |
![]() |
Umesh Kumar . MDFBA: A Mobile Agent and Device Fingerprint-based Authentication Scheme for Enhanced Android Security. International Journal of Computer Applications. 187, 7 ( May 2025), 6-19. DOI=10.5120/ijca2025924953
Modern digital ecosystems, from enterprise infrastructures to Internet of Things networks, depend heavily on authentication mechanisms. Based on important performance and security criterias, such as authentication accuracy, latency, scalability, security resilience, computational overhead, and network traffic generation, this study assesses three authentication models: OAuth, Zero Trust, and a Mobile Agent and Device Fingerprint-Based Authentication Scheme (MDFBA). Using mobile agents and signature-based authentication, the implemented algorithm ensures low latency (1.23 ms) and minimum traffic overhead (~5,000 bytes for 100 nodes), making it ideal for resource-constrained situations. OAuth provides excellent scalability and interoperability and is commonly used for web authentication and Single Sign-On (SSO). However, it has middling authentication accuracy (~85%) due to security flaws including token theft and phishing attempts. In high-performance networks, its latency (72.8 ms) and traffic generation (~15,000 bytes per 100 nodes) pose scalability issues. The most secure of the three models, Zero Trust, uses dynamic policy enforcement and continuous verification, which makes it extremely resistant to replay, credential theft, and man-in-the-middle attacks. This security feature is limited in low-resource situations due to its high latency (~166.2 ms), high processing needs, and substantial network traffic (~40,000 bytes per 100 nodes). Performance and security are traded off, according to a quantitative examination conducted across different node scales. Zero Trust adds significant processing and network overheads, but it guarantees better security. On the other hand, the Implemented Algorithm balances security and efficiency, making it appropriate for Internet of Things applications, whereas OAuth offers scalability but is still susceptible to attack vectors. This study emphasizes the urgent need for hybrid authentication strategies that combine the scalability of OAuth, the security robustness of Zero Trust, and optimizations based on mobile agents. Future research will examine blockchain-based decentralized identity verification, AI-powered adaptive authentication, and quantum-resistant cryptographic improvements.