Examining The Relationship Between IoT Device Authentication Protocols and Data Security in Nigerian Banks

Authors

  • Aburuotu, Emmanuel Chinwendu Department of Computer Science, Faculty of Natural and Applied Sciences, Ignatius Ajuru University of Education, Port Harcourt, Rivers State, Nigeria
  • Evaristus Chibuzor Nwoke Department of Computer Science, Faculty of Science and Computing, University of Agriculture and Environmental Sciences, Umuagwo, Imo State, Nigeria
  • Eva Nwereka Obinna Department of Computer Science, Faculty of Natural and Applied Sciences, Ignatius Ajuru University of Education, Port Harcourt, Rivers State, Nigeria

Keywords:

Internet of Things, Authentication Protocols, Data Security, Banking Systems, Cybersecurity, Nigeria

Abstract

This study examines the relationship between IoT device authentication protocols and data security in Nigerian banks. The increasing integration of Internet of Things (IoT) technologies in banking operations has improved service delivery but has also introduced significant cybersecurity challenges, particularly in relation to device authentication and protection of sensitive financial data. The study adopted a correlational survey research design and was conducted within the banking sector in Nigeria. The population comprised IT personnel, cybersecurity experts, and digital banking staff, from which a sample of 367 respondents was determined using the Taro Yamane formula. Data were collected using a structured questionnaire and analyzed using mean, standard deviation, and Pearson Product-Moment Correlation Coefficient. The findings revealed that IoT device authentication protocols such as multi-factor authentication, biometric systems, and cryptographic mechanisms are widely adopted in Nigerian banks. The study also found that the level of data security in IoT-enabled banking systems is relatively high, although concerns about data breaches persist. Furthermore, the results indicated a strong and statistically significant relationship between IoT authentication protocols and data security (r = 0.642, p < 0.05), suggesting that improvements in authentication mechanisms significantly enhance data protection. The study concludes that effective authentication protocols are critical to ensuring data security in IoT-driven banking environments. It recommends the strengthening of authentication systems, regular updates of security protocols, and stricter regulatory oversight by institutions such as the Central Bank of Nigeria to enhance cybersecurity resilience in Nigerian banks.

References

Y. O. Akinwale and A. K. Kyari, “Cybersecurity challenges in the Nigerian banking sector,” Journal of Financial Crime, vol. 27, no. 3, pp. 835–850, 2020.

I. Alhassan, D. Sammon, and M. Daly, “Data governance activities: An analysis of the literature,” Journal of Decision Systems, vol. 29, no. 1, pp. 23–45, 2020.

R. Amin et al., “A robust and anonymous patient monitoring system using wireless medical sensor networks,” Future Generation Computer Systems, vol. 80, pp. 483–495, 2018.

L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2017.

R. Böhme and T. Moore, “The economics of cybersecurity,” Science, vol. 338, no. 6108, pp. 646–651, 2012.

M. Conti et al., “Internet of Things security and forensics: Challenges and opportunities,” Future Generation Computer Systems, vol. 78, pp. 544–546, 2018.

A. K. Das et al., “Designing secure and efficient authentication protocol for IoT-enabled smart environments,” Future Generation Computer Systems, vol. 92, pp. 565–580, 2019.

F. D. Davis, “Perceived usefulness, perceived ease of use, and user acceptance of information technology,” MIS Quarterly, vol. 13, no. 3, pp. 319–340, 1989.

S. C. Eze, V. C. Chinedu-Eze, and A. O. Bello, “The adoption of digital banking in Nigeria: Issues and challenges,” Journal of African Business, vol. 22, no. 4, pp. 560–577, 2021.

M. S. Farash et al., “An efficient user authentication and key agreement scheme for heterogeneous wireless sensor networks,” Ad Hoc Networks, vol. 36, pp. 152–176, 2016.

P. Gope and T. Hwang, “A realistic lightweight authentication protocol preserving strong anonymity for securing RFID systems,” Computers & Security, vol. 55, pp. 271–280, 2016.

J. Gubbi et al., “Internet of Things (IoT): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013.

W. H. Hassan, M. A. Habib, and S. Islam, “IoT applications in banking and financial services,” IEEE Access, vol. 9, pp. 123456–123470, 2021.

W. R. King and J. He, “A meta-analysis of the Technology Acceptance Model,” Information & Management, vol. 43, no. 6, pp. 740–755, 2006.

N. M. Kumar, P. K. Mallick, and S. Mishra, “The Internet of Things: Insights into applications and challenges,” Procedia Computer Science, vol. 132, pp. 109–115, 2019.

S. Kumari, M. K. Khan, and X. Li, “An improved authentication scheme for IoT environments,” Journal of Network and Computer Applications, vol. 150, p. 102472, 2020.

C. F. Lai, M. Chen, and K. Hwang, “Secure mobile cloud computing with authentication and data protection,” IEEE Systems Journal, vol. 10, no. 1, pp. 1–10, 2016.

S. Madakam, R. Ramaswamy, and S. Tripathi, “Internet of Things (IoT): A literature review,” Journal of Computer and Communications, vol. 3, no. 5, pp. 164–173, 2015.

N. Marangunić and A. Granić, “Technology Acceptance Model: A literature review from 1986 to 2013,” Universal Access in the Information Society, vol. 14, no. 1, pp. 81–95, 2015.

C. C. Nwachukwu and T. C. Okeke, “Digital transformation and cybersecurity resilience in Nigerian financial institutions,” African Journal of Information Systems, vol. 15, no. 2, pp. 45–63, 2023.

T. T. Oladimeji, A. A. Adeyemi, and O. S. Ogunleye, “Cyber threats and financial fraud in Nigerian banks,” International Journal of Cybersecurity Intelligence & Cybercrime, vol. 5, no. 1, pp. 23–41, 2022.

S. Sicari et al., “Security, privacy and trust in Internet of Things: The road ahead,” Computer Networks, vol. 76, pp. 146–164, 2018.

W. Stallings, Cryptography and Network Security: Principles and Practice, 7th ed. Harlow, U.K.: Pearson, 2018.

V. Venkatesh and F. D. Davis, “A theoretical extension of the Technology Acceptance Model: Four longitudinal field studies,” Management Science, vol. 46, no. 2, pp. 186–204, 2000.

R. Von Solms and J. Van Niekerk, “From information security to cybersecurity,” Computers & Security, vol. 38, pp. 97–102, 2013.

M. Wazid et al., “Lightweight authentication protocols for IoT,” IEEE Access, vol. 7, pp. 141–221, 2019.

M. E. Whitman and H. J. Mattord, Principles of Information Security, 7th ed. Boston, MA, USA: Cengage Learning, 2021.

Y. Zhang, R. H. Deng, and E. Bertino, “Secure authentication protocols for IoT: A survey,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1891–1920, 2020.

Downloads

Published

2026-04-26

How to Cite

Chinwendu, A. E. ., Nwoke, E. C. ., & Obinna, E. N. . (2026). Examining The Relationship Between IoT Device Authentication Protocols and Data Security in Nigerian Banks. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 7(2), 316–328. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/924

Issue

Section

Articles