2,99 €
This book presents recent advancements in Mobile Payment Systems and their Security issues and prospects. It comprises of several chapters where in each of the chapter, novel techniques that enhances the security of mobile payment systems are discussed and presented. The readers of the book are going to get enriched with the knowledge about how the security of mobile payment systems can be enhanced.
Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:
Veröffentlichungsjahr: 2020
1. INTRODUCTION
M-commerce or mobile commerce is the buzz word in the present era where the organizations are focusing on creating a business model that can deploy and reap benefits of this opportunity. To be specific, M-commerce (mobile commerce) can be defined as trading of products and services with the help of handheld devices like mobile phones, smart phones and other smart devices .The distinctive feature of m-commerce is that the users can access and use it from anywhere, any location with the availability of mobile data on their smart devices. The users as well as the service providers have realized that m-commerce is here to stay and therefore, everyone seems to be determined in unleashing the features those m-commerce offers. The rise in m-commerce platform is evidenced from the fact that in 2017, the number of mobile payment users stood at 52.9 million while in 2019, it reached at 93.3 million, according to a report. Thus, there is no doubt that M-commerce is helpful in making our life much easier for today’s generation where there is no need to remain connected with network cables and wires and any kind of activity that is being carried out through mobile devices is purely wireless, thanks to the advancements in Information technology, Telecommunication networks. The mobile users can enjoy their shopping, the employees are doing their office work from the convenience of their homes, but this convenience comes with a price. The most important aspect here is the security of the mobile payment network and to ensure that the monetary transactions are carried out without any risk of security breach like passive attacks, eavesdropping, and loss of private information. All these security threats have happened in the past and thus, even though the mobile users are using mobile devices for online payments and shopping, they always remain under constant threat of data loss or a security breach.
Mobile commerce disposed the passive attacks and on-going conversation with the help of radio frequency. Customers have numerous concerns about the information which they share with participating parties i.e data or voice messages or both from unauthorized party gaining access. Alternatively identification integrity and message integrity are also the part of mobile security. Unhappily, when it comes to online transaction, mobile communication doesn’t offer full security measures. For a safe and secure M-Commerce system, the following services should be considered.
Authentication- It is the process of verifying and validating the credentials of a user or mobile client who possesses the mobile device. Both the mobile client and the merchant need to prove their identities to each other before the transaction are initiated . Confidentiality- It is the process of ensuring that the data and message traveling over the untrusted network remains safe and secure. Ensuring confidentiality is of prime importance as if this is compromised, the sole purpose of conducting the online business gets over. The unauthorized users shouldn’t be able to access and see the transaction details. Integrity- It is the process of ensuring that the message contents are not tampered or shared with unauthorized users during its transmission. Non-Repudiation-This process is carried out to ensure that both the sending and receiving parties cannot deny of having participated in an online communication.Diverse systems of making payment through mobile devices have developed in recent years that let the mobile payments take place in a seamless and secure manner. To secure payment through mobile various new models have been proposed by various authors. In this review paper, the focus is on analysing the various proposed models and what technologies and protocols have been used in the models. The remaining paper is structured as per the following sections: Section 2 presents the review method where research questions are formulated and stepwise review process is explained. Section 3 presents the detailed literature review of the recent work in m-commerce payment systems. Section 4 presents a summary of the recent work in the area. Section 5 presents the findings and future scope of research in the area. Finally, Section 6 offers the conclusion.
2. RESEARCH OBJECTIVES
Following research questions (RQ) have been framed for conduct the review in an organized manner in order to obtain the recent research status in Mobile Payment Security.
RQ1. What are the various proposed models of security?
RQ2. What are the various technologies of Mobile Payment Security?
RQ3. What Security Protocols have been used?
RQ4. What is the future scope of research in Mobile Payment Security Techniques?
3. METHODOLOGY
To achieve the above mentioned objectives, the author has followed the research methodology portrayed in Figure 2. In the first phase, following Research Repositories are selected to search the required research contents:
IEEEXplore Digital Library (http://ieeexplore.ieee.org)ACM Digital Library (http://portal.acm.org)SpringerOthers (Google Scholar, Research Gate, Academia.edu )
In the second stage, various appropriate keywords are used to search the required research contents. As a result, a total of 318 research papers were found. Table 1 enlists the keywords used and their results.
Table 1: Search Results
Database
“M-Commerce payment systems +
models”
“M-commerce payment system +
security”
M-commerce payment system +
technologies”
Total
IEEExplore
12
16
16
44
ACM Digital Library
02
7
8
17
Springer
04
03
03
10
Total
18
26
27
71
In the third stage, the authors filtered the search results by going through the abstract of each and every paper appeared in the keyword search results and assessing their suitability for this study. Thereafter, the papers were accepted or rejected based on the specific selection criteria. At the end of reading all the abstracts, following papers were considered into literature.
4. RELATED WORK
The authors of this paper proposed a model called SeMoPS (Secure Mobile Payment for Mobile System) based on Wireless Application Protocol. Their model involved six elements namely client, trader, Mobile Network Operator (MNO) which performs the task of processing the client payment apart from playing the role of wireless access provider, bank is the financial institution where the client and merchant accounts are present, Trusted Third Party (TTP) are the organizations that come into picture in case of any disputes and Data Center which performs the function of routing and delivering notifications to addressee and payment processor. Their Model was divided in to five steps: Transferring information, Payment request, payment notice, payment confirmation, Transferring amount. The results show that the model gives reliable and trusted mobile payment services to the customer with no threat about security lapse of private and sensitive information.