CATHOLIC UNIVERSITY OF ZIMBABWE
BUSINESS MANAGEMENT AND INFORMATION TECHNOLOGY
Design and Implementation of Secure One-Time Password Multifactor Authentication
for Shared Mobile Network Base Stations in Zimbabwe.
By
Barbara Chitepo
Chapter V: Summary conclusions and recommendations
5.0 Introduction
This chapter summarizes the key findings of the study, drawing conclusions based on the data
presented in Chapter 4. The discussion will focus on addressing the research objectives,
evaluating the effectiveness of the proposed OTP-based multifactor authentication system for
shared mobile network base stations in Zimbabwe. Additionally, recommendations for
improving security, scalability, and user experience will be provided to guide future
implementations in similar contexts. The chapter aims to provide a comprehensive overview
of the study’s insights and offer actionable solutions based on the research findings.
5.1 Summary
The study examined the security challenges associated with existing authentication systems
used in Zimbabwe's shared mobile network base stations and proposed a secure OTP-based
multifactor authentication system as a solution. The key findings of the research, presented in
the previous chapter, highlight the following points;
Security Challenges: The current authentication methods used in shared mobile network
base stations are vulnerable to various security threats, including unauthorized access and
data breaches. These systems were found to be inadequate in protecting sensitive information
and ensuring the privacy of users.
OTP-based System Design: The proposed OTP-based multifactor authentication system
addressed these security concerns effectively. The system was designed to enhance access
control by requiring multiple forms of authentication before granting access to critical
network infrastructure. It included a combination of something the user knows (PIN) and
something the user possesses (OTP sent via SMS or email).
Usability and Scalability: While the OTP-based system showed promising results in
improving security, challenges were encountered during the implementation phase. Some
users found the system difficult to use initially, especially those unfamiliar with such
authentication methods. However, the system was scalable and could be implemented across
multiple base stations without significant resource constraints.
1
System Integration: Integrating the OTP-based MFA system with existing infrastructure
posed challenges. Legacy systems, which were not initially designed to support multifactor
authentication, required modifications to ensure smooth integration. However, once the
integration was complete, the system demonstrated improved security and reduced the risk of
unauthorized access.
Operational Performance: The implementation of the OTP-based system had a positive
impact on the operational performance of the base stations. Security incidents decreased
significantly, and network downtime due to unauthorized access was minimized. However,
technical issues, such as delays in receiving OTPs due to network connectivity, were
identified as areas for improvement.
5.2 Conclusions
The research set out to address key security concerns surrounding the authentication systems
in Zimbabwe’s shared mobile network base stations. Based on the findings presented in the
previous chapter, the following conclusions were be drawn;
Evaluation of Security Challenges: The current authentication systems are significantly
outdated, leaving mobile network base stations vulnerable to various security risks. The lack
of robust authentication mechanisms made it easy for unauthorized users to gain access to
critical systems, threatening the integrity and confidentiality of the network.
Design of OTP-based MFA System: The OTP-based multifactor authentication system was
an effective solution to these security challenges. It demonstrated a marked improvement
over the existing systems, offering a more secure and reliable means of access control. The
system’s design, including the integration of both PIN and OTP authentication, effectively
mitigated risks associated with unauthorized access.
Implementation and Testing of OTP-based MFA: The implementation phase revealed
both strengths and challenges. The OTP-based system significantly improved security, but
issues related to user adaptation and system integration with legacy infrastructure were
encountered. These challenges highlighted the need for careful planning and support for users
during the transition.
Impact on Security and Operational Performance: The proposed OTP-based MFA system
positively impacted security and operational performance, reducing unauthorized access and
2
enhancing overall network security. However, network connectivity issues occasionally
delayed OTP delivery, affecting user experience and system efficiency.
5.3 Recommendations
Based on the findings and conclusions of this study, the following recommendations are
made;
It is essential to provide comprehensive training for users on the OTP-based MFA system.
Many users initially struggled with the system due to unfamiliarity with the process. A
targeted training program can enhance their understanding and improve their experience.
To address the issue of delayed OTPs, it is recommended that the system be equipped with a
more reliable and faster delivery mechanism, possibly incorporating alternative
communication channels, such as push notifications or in-app OTP generation.
Many of the challenges encountered during the implementation phase were due to the
limitations of existing infrastructure. It is recommended that the legacy systems be upgraded
to support modern security protocols like multifactor authentication. This will facilitate
smoother integration of new security solutions and improve the overall system's
effectiveness.
The OTP-based MFA system demonstrated scalability, but more work is needed to ensure
that it can be seamlessly deployed across different base stations without significant
operational disruptions. A phased implementation approach could help mitigate potential
challenges and allow for continuous monitoring and evaluation.
Regular monitoring of the system’s performance is critical to identifying potential
weaknesses and improving its functionality. Implementing a feedback loop with regular
audits and user surveys will ensure that the OTP-based MFA system remains effective and
adaptable to evolving security threats.
3
4