Buradasınız

Security Protocol Design for Mobile Banking

Journal Name:

Publication Year:

Abstract (2. Language): 
Accessing banking services on a mobile device give customers a great deal of independence. Not only does it put them in charge, it also enables them to do their banking independently of their location and time. A main worry for consumers and financial service providers is the security of mobile banking. In providing mobile banking services, it is very important to take the proper security authentication and authorization, because these services, while offering very good mobility and facility, can be easily exposed to diverse violation threats. In this paper, a novel security protocol for secure mobile banking applications is proposed to address security worries. The presented protocol permits customers to authenticate with the banking services with least user interactions but with new advance security characteristics.
FULL TEXT (PDF): 
143-147

REFERENCES

References: 

[1] K. Siau, E.-P. Lim, and Z. Shen, "Mobile Commerce: Promises, Challenges and Research Agenda," ed: IGI Global, 2001, pp. 4-13.
[2] G. Xu and J. A. Gutierrez, "An Exploratory Study of Killer Applications and Critical Success Factors in M-Commerce", ed: IGI Global, 2006, pp.63-79.
[3] Jin Nie and Xianling Hu. Mobile Banking Information Security and Protection Methods, Computer Science and Software Engineering, 2008 International Conference , pp. 587-590, 2008.
[4] Suraj, sankaran, “Mobile Banking Architecture :Palisade”, http://palisade.plynt.com / issues /2007May / mobile-banking / ,MAY, 2007.
[5] R. Fisher, Business aspects of trusted third party services in Europe, Information Technology Applications in Biomedicine, IT IS - ITAB ' 99. IEEE EMBS International Conference, pp. 38-39, 1999.
[6] S. Alam, H. Kabir, M. Sakib, A. Sazzad, C. Shahnaz, and S. Fattah, A secured electronic transaction scheme for mobile banking Bangladesh incorporating digital watermarking, Information Theory and Information
International Journal of Science and Engineering Investigations, Volume 2, Issue 18, July 2013 147
www.IJSEI.com Paper ISSN: 2251-8843 ID: 21813-21
Security (ICITIS), 2010 IEEE International Conference on, pp. 98-102, 2010.
[7] D. Buchholz,A. Cavazos-Wright, ”Consumers andMobile Financial Services 2013”, Board of Governors of the Federal Reserve System, Washington, DC 20551 , 2013.
[8] V. Chugh, ”Master Circular - Mobile Banking Tansactions in India - Operative Guidelines for Banks”,2013.
[9] V. Pegueros, ”Security of Mobile Banking and Payments”, SANS Institute InfoSec Reading Room, 2012.
[10] Davis, A., 2011, Securing consumer devices. Information Security Forum, (April). Esmaili, E. et al., 2011. The Role of Trust and Other Behavioral Intention Determinants on Intention toward Using Internet Banking. International Journal of Innovation, Management and Technology, 2(1), pp.95-100. Available at: http://www.ijimt.org/papers/111-E00102.pdf [Accessed January 3, 2012].
[11] M. Elkhodr, ”A Proposal to Improve the Security of Mobile Banking Applications”, 2012 Tenth International Conference on ICT and Knowledge Engineering, 2012.
[12] C. Jianmin, ” Research on Behavior-based Detection Method for Mobile Application Security”, 2012 International Conference on Industrial Control and Electronics Engineering, 2012.
[13] V. Goyal, D. Pandey, ”Mobile Banking in India: Practices,Challenges and Security Issues”, International Journal of Advanced Trends in Computer Science and Engineering, 2012.
[14] D. Weerasinghe, V.Rakocevic, M. Rajarajan, ”Security Framework for Mobile Banking”, book chapter, 2013.
[15] I. Ashraf, ”Mobile Banking Security”, Post Graduate IT Audit - Vrije Universiteit, Amsterdam Student number 2043068 Thesis number 1073 The Hague, The Netherlands, April 2012.

Thank you for copying data from http://www.arastirmax.com