Preview

SECURITY ISSUES IN MOBILE PAYMENT SYSTEMS

Powerful Essays
Open Document
Open Document
922 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SECURITY ISSUES IN MOBILE PAYMENT SYSTEMS
Security Issues in Mobile Payment Systems

A Research Presented to

the Faculty of the Graduate School

University of the Cordilleras

In Partial Fulfillment

of the Requirements for E-Business Security

by

MAVERICK T. CABUNOT

December 2012

Abstract

The banking industry and regular citizens all incur a high overhead in using physical cash. Electronic cash and cell phone-based payment in particular is a practical alternative to physical cash since it incurs much lower overheads and offers more convenience. Because security is of vital importance in financial transactions, it is imperative that attack paths in this application be identified and analyzed. This paper will investigate the vulnerabilities in several dimensions – in choice of hardware/software platform, in technology and in cell phone operating system.

Introduction

There are several reasons why governments and financial institutions should advocate the use of electronic payments in financial transactions. E-payment systems offer huge cost savings to the government because use of electronic cash is much cheaper than printing paper currency. According to Agarwal (2009) The widely used ATM (Automated Teller Machine) was one of the early successful experiments aimed at saving costs to the bank and at the same time providing 24 X 7 cash service to the customer. However, ATMs deal with paper currency. Furthermore, the cost of replenishing cash on ATMs and maintaining them is also high. Electronic cash and electronic payment schemes are an attractive alternative from the perspective of cost and convenience. It is expected that in the space of electronic payment systems, mobile payment schemes – those in which at least one part of the transaction is carried out using a mobile device - will soon dominate the world of electronic payments. This is, at least in part, due to the easy availability of mobile phones.



References: L. Antovski and M.Gusev [2003]. M-payments. 25th International conference Information technology Interfaces ITI 2003. The Bunker. (Online) http://www.thebunker.net/resources/bluetooth. D. Kugler [2003]. Man in the Middle Attacks on Bluetooth. In Financial Cryptography '03, Long Beach. L. Carettoni, C. Merloni and S. Zanero [2007]. Studying Bluetooth Malware Propagation: The BlueBag Project. IEEE Security & Privacy. 2007, Vol. 5, 2.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Another type of electronic payment is micropayment this was developed for smaller purchase amounts (less than $10), such as; music downloads, individual articles, which would be too small for conventional credit…

    • 679 Words
    • 3 Pages
    Good Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Week 7 Checkpoint It 205

    • 694 Words
    • 3 Pages

    Many of us have become accustomed to electronic payment systems. These systems will continue to increase as businesses and banks present more opportunities to use them.…

    • 694 Words
    • 3 Pages
    Good Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Bluetooth enabled devices are exploding on the Internet at an astonishing rate. At the range of connectivity has increased substantially. Insecure Bluetooth connections can introduce a number of potential serious security issues. Hence, there is a need for a minimum standard for connecting Bluetooth enable devices.…

    • 644 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.…

    • 610 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Bibliography: Certic, S. (2013, February 18). The Future of Mobile Security. Computer Science - Cryptography and Security.…

    • 1441 Words
    • 6 Pages
    Better Essays
  • Better Essays

    References: Anatomy of a Wireless "Evil Twin" Attack (Part 1). (n.d.). Internet Security Solutions. Retrieved November 16, 2013, from http://www.watchguard.com/infocenter/editorial/27061.asp…

    • 3777 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Toshendra Sharma, 113050013 Saptarshi Sarkar, 113050044 Pankaj Vanwari, 114058001 Under guidance of: Prof. Bernard Menezes Outline  Bluetooth history  Bluetooth Protocol  Layers in Bluetooth  Security in Bluetooth  Vulnerabilities  Attacks/Exploits  Demonstration Bluetooth Technology  proprietary open wireless technology standard for exchanging data over short distances  was originally conceived as a wireless alternative to RS232 data cables  It uses short wave length radio transmission in ISM band from 2400-2480 MHz Benefits of Bluetooth Technology  Cable replacement  Ease of file sharing  Wireless synchronization  Internet connectivity Implementation  frequency hopping spread spectrum  chops up the data being sent and transmits chunks of it up to 79 bands  Packet Based Protocol with a Master-Slave Structure  Piconet  A piconet is an ad-hoc computer network which used to link group of devices, where protocols allow one master device to interconnect with up to seven active slaves…

    • 935 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Mobile Banking

    • 8051 Words
    • 33 Pages

    The first mobile banking and payment initiatives were announced during 1999 (the same year that Fundamo deployed their first prototype). The first major deployment was made by a company called Paybox (largely supported financially by Deutsche Bank). The company was founded by two young German’s Mathias Entemann and Eckart Ortwein and successfully deployed the solution in Germany, Austria, Sweden, Spain and the UK.…

    • 8051 Words
    • 33 Pages
    Powerful Essays
  • Powerful Essays

    trusted third party to maintain the electronic database. The conventional methods of encryption in Secure…

    • 3115 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Mobile Malware

    • 1047 Words
    • 3 Pages

    La Polla, M., Martinelli, F., & Sgandurra, D. (2013b). A Survey on Security for Mobile Devices. IEEE Communications Surveys Tutorials, 15(1), 446–471. doi:10.1109/SURV.2012.013012.00028…

    • 1047 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Nicolas Seriot built an application for iOS users called “SpyPhone” which was capable of tracking users and all their activities, then, sending this data to different servers without the user (people) knowledge. The “SpyPhone” app proved that even smartphones are capable of being hacked and be inflicted with malicious software for as long as one is connected to the Internet.…

    • 380 Words
    • 2 Pages
    Good Essays