Preview

SECURITY ISSUES IN MOBILE PAYMENT SYSTEMS

Powerful Essays
Open Document
Open Document
922 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SECURITY ISSUES IN MOBILE PAYMENT SYSTEMS
Security Issues in Mobile Payment Systems

A Research Presented to

the Faculty of the Graduate School

University of the Cordilleras

In Partial Fulfillment

of the Requirements for E-Business Security

by

MAVERICK T. CABUNOT

December 2012

Abstract

The banking industry and regular citizens all incur a high overhead in using physical cash. Electronic cash and cell phone-based payment in particular is a practical alternative to physical cash since it incurs much lower overheads and offers more convenience. Because security is of vital importance in financial transactions, it is imperative that attack paths in this application be identified and analyzed. This paper will investigate the vulnerabilities in several dimensions – in choice of hardware/software platform, in technology and in cell phone operating system.

Introduction

There are several reasons why governments and financial institutions should advocate the use of electronic payments in financial transactions. E-payment systems offer huge cost savings to the government because use of electronic cash is much cheaper than printing paper currency. According to Agarwal (2009) The widely used ATM (Automated Teller Machine) was one of the early successful experiments aimed at saving costs to the bank and at the same time providing 24 X 7 cash service to the customer. However, ATMs deal with paper currency. Furthermore, the cost of replenishing cash on ATMs and maintaining them is also high. Electronic cash and electronic payment schemes are an attractive alternative from the perspective of cost and convenience. It is expected that in the space of electronic payment systems, mobile payment schemes – those in which at least one part of the transaction is carried out using a mobile device - will soon dominate the world of electronic payments. This is, at least in part, due to the easy availability of mobile phones.



References: L. Antovski and M.Gusev [2003]. M-payments. 25th International conference Information technology Interfaces ITI 2003. The Bunker. (Online) http://www.thebunker.net/resources/bluetooth. D. Kugler [2003]. Man in the Middle Attacks on Bluetooth. In Financial Cryptography '03, Long Beach. L. Carettoni, C. Merloni and S. Zanero [2007]. Studying Bluetooth Malware Propagation: The BlueBag Project. IEEE Security & Privacy. 2007, Vol. 5, 2.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Advanced technology in electronic payment system allows money be transformed from traditional currency to newer forms including credit card, debit cards, electronic cheque, and electronic transactions using computing and communications devices. All kinds of secure…

    • 3130 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    There are various types of electronic categories for the e-commerce system. The most popular type of electronic payment is the digital wallet. By using the digital wallet for paying purchases over the web more efficiently and by eliminating the need repeated information for each purchase. The digital wallet is more secure, and the owner’s information is saved automatically when the information is completed for a purchase. For example; the consumer would not have repeat credit-card information each time they purchase something. Example: Google Checkout.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Week 7 Checkpoint It 205

    • 694 Words
    • 3 Pages

    Many of us have become accustomed to electronic payment systems. These systems will continue to increase as businesses and banks present more opportunities to use them.…

    • 694 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Sundara Summary

    • 258 Words
    • 2 Pages

    Sundara is a girl who is experiencing the actual point of football. The author develops Sundara’s character by telling us about what she doesn't understand about football,what she does to get help about what football is,and what she has learned about football. Sundara doesn’t understand anything about football and why people were so excited about the players. The text says that,”Why were football players so great?.’’This shows that she didn’t understand why the football players were so great at what they were doing and why people liked them.…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bluetooth enabled devices are exploding on the Internet at an astonishing rate. At the range of connectivity has increased substantially. Insecure Bluetooth connections can introduce a number of potential serious security issues. Hence, there is a need for a minimum standard for connecting Bluetooth enable devices.…

    • 644 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Securing Mobile Devices. (n.d.). Information Technology - Information Security – Information Assurance | ISACA. Retrieved from http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Securing-Mobile-Devices.aspx…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.…

    • 610 Words
    • 3 Pages
    Good Essays
  • Better Essays

    References: Anatomy of a Wireless "Evil Twin" Attack (Part 1). (n.d.). Internet Security Solutions. Retrieved November 16, 2013, from http://www.watchguard.com/infocenter/editorial/27061.asp…

    • 3777 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    trusted third party to maintain the electronic database. The conventional methods of encryption in Secure…

    • 3115 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Mobile Malware

    • 1047 Words
    • 3 Pages

    Mobile devices have changed the way we live, work and play yet the tricks that have been used by cyber criminals to install malware on our computers are now beginning to threaten our smart phones and other mobile devices. Malware is any type of hostile, intrusive, annoying software or program code that is designed to use a device without the owner’s consent. They can be grouped into several categories ranging from viruses, worms, Trojans, rootkits and botnets. Throughout this paper I will discuss the different types of malware more in detail, divulge the operating system that may be more vulnerable to malware, describe the stages of malware attacks and explain the practices to avoid malware on your mobile device.…

    • 1047 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Toshendra Sharma, 113050013 Saptarshi Sarkar, 113050044 Pankaj Vanwari, 114058001 Under guidance of: Prof. Bernard Menezes Outline  Bluetooth history  Bluetooth Protocol  Layers in Bluetooth  Security in Bluetooth  Vulnerabilities  Attacks/Exploits  Demonstration Bluetooth Technology  proprietary open wireless technology standard for exchanging data over short distances  was originally conceived as a wireless alternative to RS232 data cables  It uses short wave length radio transmission in ISM band from 2400-2480 MHz Benefits of Bluetooth Technology  Cable replacement  Ease of file sharing  Wireless synchronization  Internet connectivity Implementation  frequency hopping spread spectrum  chops up the data being sent and transmits chunks of it up to 79 bands  Packet Based Protocol with a Master-Slave Structure  Piconet  A piconet is an ad-hoc computer network which used to link group of devices, where protocols allow one master device to interconnect with up to seven active slaves…

    • 935 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Nicolas Seriot built an application for iOS users called “SpyPhone” which was capable of tracking users and all their activities, then, sending this data to different servers without the user (people) knowledge. The “SpyPhone” app proved that even smartphones are capable of being hacked and be inflicted with malicious software for as long as one is connected to the Internet.…

    • 380 Words
    • 2 Pages
    Good Essays