When it comes to security, most mobile devices are a target waiting to be attacked. This arises the need for security. There are certain domains wherein the confidentiality of information is of utmost importance and needs to be protected from unauthorized users. Hence, authentication is used for protection of this information. The usage of authentication techniques has been persistent in the domain of security. However, older techniques are now more vulnerable and fail to provide the same level of protection as they once did. Hence, there is an arising need for the advent of new techniques that make use of authentication at increased complexity so that level of security is enhanced. Two Way Mobile Authentication Systems (2WMAS) describes the methods for implementing stronger authentication in smart phones. The two approaches being used in two way mobile authentication system are- Something you know: Personal Identification Number (PIN) something you are: Facial Scan