Economic Bulletin of the National Mining University

 

IssuesSectionsAuthorsKeywords

Article

Issue:2022 №1 (77)
Section:Finances
UDK:030
DOI:https://doi.org/10.33271/ebdut/77.134
Article language:English
Pages:134-139
Title:Security issues in next generation mobile payment systems
Author:Mshvidobadze T. I., Gori State University
Annotation:Methods. In the security process system the following methods are used: analysis method (generalization of the problem, elaboration of the measures to improve security procedures), comparison (to identify of the assessment of M-Payment systems), formalization (to set the problem of the mathematical modelling). Results. The different payment schemes and their use, technology and security have been generalized. Most pay methods are account-based payment systems and their core. The focus is on security, privacy and authentication. Models of mobile payment system (MPS) have been proposed, as well as their technologies and payment methods, various security mechanisms embedded in MPS, encryption technologies and authentication methods. Mobile payment system security mechanism is proposed in response to modern demands. It has been demonstrated that keeping in check the confidentiality, integrity and availability triad, each payment should be made with authentication and encryption because the future of MPS depends on its security features. Novelty. Scientific novelty of the research is in the outlining of strategic prospects of the encryption technologies, authentication methods, and firewall in MPS, to provide different security aspects. Practical value. The potential impact of digitalization on mobile payment systems makes it more difficult than just the result of modular reorganization. The practical value of the paper is to fix the dynamics that can not be found in developed countries. Findings can be applied to other mobile payment systems in developing economies. 
Keywords:Electronic commerce, Business Models, Transactions, Mobile Payment Method, Online System, Payment system, Mobile Commerce, Authentication, Firewall, Cyberattacks
File of the article:EV20221_134-139.pdf
Literature:
  • 1. Pitoura, E., & Samaras, G. (1998). Data Management for Mobile Computing. Kluwer Academic Publishers, 1998, p. 123-127.
  • 2. Cimato, S. (2001). Design of an authentication protocol for gsm javacards. Proceedings from MIIM ’01: International Conference on Information Security and Cryptology, (pp. 355-368). Springer.
  • 3. Wang, Y., Hahn, C., & Sutrave, K. (2016). Mobile payment security, threats, and challenges. Proceedings from MIIM ’16: Second international conference on mobile and secure services (MobiSecServ), (pp. 1-5), IEEE.
  • 4. Baza, M., Lasla, M, Mahmoud, M., Srivastava, G., & Abdallah, M. (2019). Bride: Ride sharing with privacy-preservation, trust and fair payment atop public blockchain. IEEE Transactions on Network Science and Engineering, pp. 247-250. doi.org/10.1109/wcnc.2019.8885769
  • 5. Securing the future of payments together. (2020).
  • 6. Kumar, A., & Shanbhaug, J. (2012). Addressing Security and Privacy Risks Mobile applications. IEEE Computer society. pp. 78-83.
  • 7. Saxena, S., Vyas, S., Kumar, B., & Gupta, S. (2019). Survey on online electronic paymentss security. Proceedings from MIIM ’19: Amity International Conference on Artificial Intelligence (AICAI), (pp. 756-751), IEEE.
  • 8. Thangamuthu, A. (2020). A survey on various online payment and billing techniques. Humanities, vol. 7, no. 3, (pp. 86-91).
  • 9. Saranya, A., & Naresh, R. (2021). Efficient mobile security for e-health care application in cloud for secure payment using key distribution. Neural Processing Letters, pp. 1-12.
  • 10. Téllez, J., & Zeadally, S. (2017). Mobile Payment Systems. Springer, pp.27-30.
  • 11. Tian, F., et al. (2009). Application and Research of Mobile E-commerce security based on WPKI. Proceedings from MIIM ’09: IEEE Internatioal Conference on Information Assurance and Security, (pp. 3-7).
  • 12. Sun, J., & Zhang, N. (2019). The mobile payment based on public-key security technology. Journal of Physics: Conference Series, p. 201, IOP Publishing.
  • 13. Lakshmi, K., Gupta, H., & Ranjan, J. (2017). Ussd-architecture analysis, security threats, issues and enhancements. Proceedings from MIIM ’17: International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), (pp. 798-802), IEEE.
  • 14. Tamazirt, P., Alilat. F., & Agoulmine, N. (2017). Nfc-based ubiquitous monitoring system for e-industry. Proceedings from MIIM ’17: Third International Conference on Mobile and Secure Services (MobiSecServ), pp. 1-4, IEEE.
  • 15. Bhatta, A., & Mishra, A. (2017). Gsm-based commsense system to measure and estimate environmental changes. IEEE Aerospace and Electronic Systems Magazine, vol. 32, no. 2, pp. 54-67.
  • 16. Tsao Y., Zhang Q., & Zeng, Q. (2016). Supply chain network design considering rfid adoption. IEEE Transactions on Automation Science and Engineering, vol. 14, no. 2, pp. 977-983.
  • 17. Dix, S., Phau, I., Jamieson, K., & Shimu, A. (2017). Investigating the drivers of consumer acceptance and response of sms advertising. Journal of Promotion Management, vol. 23, no. 1, pp. 62-79.
  • 18. Deng, L., Huang, H., & Qu, Y. (2017). Identity based proxy signature from rsa without pairings. IJ Net-work Security, vol. 19, no. 2, pp. 229-235.
  • 19. Kizza, J. (2017). Security in wireless networks and devices. Proceedings from Guide to Computer Net-work Security, pp. 397-427, Springer.
  • 20. Shahzad, F., Iqbal, W., & Bokhari, F. (2015). On the use of cryptdb for securing electronic health data in the cloud: A performance study. Proceedings from MIIM ’15: 17th International Conference on E-health Net-working, Application Services (HealthCom), pp. (120-125).
  • 21. Chen, W., Hancke, G., Mayes, K., Lien, Y., & Chiu, J-H. (2010). Nfc mobile transactions and authentication based on gsm network. Proceedings from MIIM ’10: Second International Workshop on Near Field Communication, (pp. 83-89), IEEE.
  • 22. Singh, B., & Jasmine, K. (2012). Comparative study on various methods and types of mobile payment system. Proceedings from MIIM ’12: International Con- ference on Advances in Mobile Network, Communication and Its Applications, (pp. 143-148), IEEE.