Cashless Transaction – Mobile Transaction

2019 ◽  
Author(s):  
Jyoti Pande
Keyword(s):  
Author(s):  
Santosh Balakrishnan ◽  
Abdelsalam (Sumi) Helal ◽  
Margaret Dunham ◽  
Youzhong Liu

Author(s):  
Geoffrey Tyolaha ◽  
Moses Israel

In recent years, the number of mobile transactions has skyrocketed. Because mobile payments are made on the fly, many consumers prefer the method to the traditional local payment approach. The rise in mobile payments has inspired this study into the security of mobile networks in order to instill trust in those who may be involved in the transaction in some way. This report is a precursor to explain and compare some of the most popular wireless networks that enable mobile payments, from a security standpoint, this research presents, explains, and compares some of the most common wireless networks that enable mobile payments. Threat models in 3G with connections to GSM, WLAN, and 4G networks are classified into four categories: attacks on privacy, attacks on integrity, attacks on availability, and assaults on authentication. In addition, we offer classification countermeasures which are divided into three categories: cryptographic methods, human factors, and intrusion detection methods. One of the most important aspects we analyze is the security procedures that each network employs. Since the security of these networks is paramount, it gives hope to subscribers. In summary, the study aims to verify if mobile payments offer acceptable security to the average user.


2022 ◽  
Vol 2022 ◽  
pp. 1-14
Author(s):  
Yadi Wang ◽  
Wangyang Yu ◽  
Peng Teng ◽  
Guanjun Liu ◽  
Dongming Xiang

With the development of smart devices and mobile communication technologies, e-commerce has spread over all aspects of life. Abnormal transaction detection is important in e-commerce since abnormal transactions can result in large losses. Additionally, integrating data flow and control flow is important in the research of process modeling and data analysis since it plays an important role in the correctness and security of business processes. This paper proposes a novel method of detecting abnormal transactions via an integration model of data and control flows. Our model, called Extended Data Petri net (DPNE), integrates the data interaction and behavior of the whole process from the user logging into the e-commerce platform to the end of the payment, which also covers the mobile transaction process. We analyse the structure of the model, design the anomaly detection algorithm of relevant data, and illustrate the rationality and effectiveness of the whole system model. Through a case study, it is proved that each part of the system can respond well, and the system can judge each activity of every mobile transaction. Finally, the anomaly detection results are obtained by some comprehensive analysis.


In this chapter, we first revisit the basic concepts of database transactions, and discuss how these concepts are achieved in practical systems. Next, we briefly go through the architecture of transaction processing systems in the centralized and the distributed environments. This chapter we have reviewed the basic concepts of database systems and database transactions, and discussed the architecture of transaction processing systems in distributed environments. We will shift our focus to transactions and transaction processing in mobile environments, which possess some unique characteristics such as the mobility of mobile computing hosts, the limitations of wireless communications and the resource constraints of mobile computing devices.


2003 ◽  
Vol 45 (1) ◽  
pp. 79-100 ◽  
Author(s):  
SungSuk Kim ◽  
SangKeun Lee ◽  
Chong-Sun Hwang

Sign in / Sign up

Export Citation Format

Share Document