School of Computing Blekinge Institute of Technology (original) (raw)
2006
Mobile banking is attractive because it is a convenient approach to perform remote banking, but there are security shortfalls in the present mobile banking implementations. This paper discusses some of these security shortfalls, such as security problems with GSM network, SMS/GPRS protocols and security problems with current banks mobile banking solutions. This paper discusses the SMS and GPRS proposed solutions for these problems. The results from these proposed solutions have proven to provide secure and economic communications between the mobile application and the bank servers.The proposed solutions allow the users to bank using secure SMS and GPRS.
IOP, 2020
The traditional banking system, such as transactions over the counter using bank book is enhanced by adding the elements of electronic banking, where nowadays all transaction can be done over the network, because of globalization and the advancement of information and communication technology. However, significant threats to this technology also come in parallel, such as from banking frauds. This is why building trust among banking users by providing security mechanisms is very important. In the electronic banking, security mechanisms mainly focus on proving a secure environment for the online transaction, especially user authentication. Many researchers have been proposed various models for the online user access authentication for the banking industry. Most of the researches are based on traditional the form of username and password, but with the varying mechanism of password forms. For example, password in arbitrary value, password in arbitrary value through secured channel, as well as biometric like fingerprint recognition, voice recognition, or retina recognition. In this paper we reviewed the current existing user access for online banking based on mobile phone, the functions of the SIM card, the characteristics mobile of the SIM card are described. Cloning, a threat to the SIM card is also described. Findings show that all the security model for online user access contains password in the form of value, biometric, or PIN. Thus, none of the existing user access proposed the idea of the user access based on International Mobile Equipment Identity (IMEI) number to strength the security of the user access. The IMEI is a 15-or 17-digit code that uniquely identifies mobile phone sets.
Different Methods of Authentication for Mobile Banking
International Journal of Membrane Science and Technology
Online banking authentication has been recognized as a key factor in the security of online banking. nowadays, different methods have been developed for online banking validation which cause problems from hacker attacks and Internet theft. Our research showed that biometrics is appropriate options for dealing with these issues. In this article, different authentication protocols for online banking have been compered.
Perceived Ease of Use, Security and Privacy of Mobile Banking
2017
The wide technologies enable people to connect and do the task wherever they are. The way people communicate and interact with others within their social circle has changed a lot with the evolution of internet. Today, rapid development in technology especially involving using of smartphone and tablet make the activities more easier and convenience in delivering the information. All parties especially financial institution today wants to give the best services to the customer and the competitive among banking sector keep rising day to day. The effective and efficient strategies management needs develop to face all the challenges. Since, mobile phone is one of the gadgets that all people use it in daily life so this is the opportunity for financial institutions to introduce mobile banking services. Regarding from that, most financial institution take initiative to provide variety facilities and bank transaction services to the customers just by using their fingertips anywhere and anyt...
2018
First of all, thanks to the Almighty God for giving me the wisdom and the strength to start and finalize this study. I would like to thank my advisor Asrat Mulatu for his continuous support of my thesis, for his patience, motivation, enthusiasm, and immense knowledge. He has shown me the right path of research and encouraged me to move forward throughout the study. I would also like to extend my sincere gratitude to Wondante Tolera whose insight, research expertise, and patience provided the basis for my study. He assists me on any challenges of my work. At last special thanks go to my family. Words can't express how grateful I am to my beloved mother for all of the sacrifices that you have made on my behalf. Your prayer for me was what sustained me this far. They always supporting and encouraging me with their best wishes propelling me towards my goal.
Jurnal Ekonomi dan Bisnis Digital (MINISTAL), 2025
Mobile banking apps have changed the way financial services areprovided, allowing users to perform banking operations from anywhere. Though this progress has granted consumers unprecedented convenience, it has also opened new doorsto vulnerabilities creating an ideal target for hackers on mobile banking applications. It explores the security issues, vulnerable regions of mobile banking applications such as using insecure communication, weak authentication, unprotected storage, andsusceptible to malware. Through empiric testing and existing vulnerability assessment frameworks, critical vulnerabilities and their potential consequences on user data and financial systemsare identified. It also recommends specific measures to reduce these vulnerabilities, suchas upgraded encryption protocols, multifactor authentication (MFA), secure coding strategies and realtime threat monitoring. Through the identification and exploration of these vulnerabilities, the study seeks tocontribute to the ongoing efforts of enhancing the security and resilience of mobile banking applications, which ultimately protects user trust and ensures adherence to regulatory standards.
Security model on mobile banking application: attack simulation and countermeasures
International Journal of Intelligent Enterprise, 2017
Nowadays, we use mobile devices in all activities such as communication, play, surf on the internet, shop online and banking transactions. But the applications used do not always comply with the security requirements on mobile environment and this can cause vulnerabilities allowing attackers to take control of the phone and to steal some users' private data. That is why, it is important to take a look at the security of mobile applications especially of financial institutions. In this paper, we will present some security issues of android applications. We will also make a reverse engineering of an Android banking application, then a static analysis of its code to detect its weaknesses. After that, we will insert a malicious code that will help us not only to take control of the smartphone but also to make a DDOS attack on a simulated bank server. Finally, we will propose some countermeasures.
E-Banking Security Issues â Is There A Solution inBiometrics?
The Journal of Internet Banking and Commerce, 2011
The providers of Internet banking services must be more responsive towards security requirements. While there is no doubt that Internet banking transaction should have layered protection against security threats, the providers should approach security considerations as part of their service offerings. Biometric based authentication and identification systems are the new solutions to address the issues of security and privacy. Using biometrics for identification restrict individuals from access to physical spaces and electronic services An effective authentication method should have customer acceptance, reliable performance, scalability to accommodate growth, and interoperability with existing systems and future plans. In this study, the security threats in Internet banking, its solutions in biometrics and its acceptance in the consumer market are studied using descriptive and exploratory research. The methods of descriptive research are used to obtain information concerning the majo...
A Review of Security Aspects of Online and ATM Transactions in Banking Domain
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE), 2015
Bankingimprovements made customers to access their services more conveniently. Among the services offered by the banks, ATM services play key role to minimize customer‟s time and energy. The current technologies elaborate fast and were constantly bringing new area to our day to day life. This paper is also includes the literature review of security aspects of online banking and ATM transactions.The growth in online transactions has resulted in a greater demand for fast and precise user identification and authentication. The study is conclude that the ebanking and ATM is very convenient mode of electronic banking .Similarly to these studies, our target is to measure the performance of online banking and ATM transactions perform by using different technologies like Biometric Technology (Thumb, Iris, Face recognition etc.), and two way authentication as well as three way authentication process. This paper gives a brief literature review and examines previous research on different topic...
A COMPARATIVE STUDY OF NETWORK SECURITIES ON MOBILE TRANSACTION
Geoffrey Terkura Tyolaha, 2018
Mobile transaction in recent years has drastically increased. Many people prefer the method than local payments procedure practiced previously, since mobile payments are done on a go process. Increase in mobile payments has prompted this research in the area of security of mobile networks to build confidence in people who may in one way or the other be involved in the transaction. This report present, explain and compare some of the most popular wireless networks that enable mobile payments, from the security point of view. Classification of threat models in 3G with connection to GSM, WLAN and 4G networks in four categories, including, attacks against privacy, attacks against integrity, attacks against availability, and attacks against authentication. We also provide a classification of countermeasures into three categories, including, cryptography methods, humans' factors, and intrusion detection methods. One of the main areas we consider is the security mechanisms involved in each network. Since security of these networks is paramount, to give hope to subscribers. In summary, the aim of the study is to verify if mobile payments offer an acceptable security to the average user.