Mobile Commerce and Related Mobile Security Issues Ashish Wadhaval

advertisement
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
Mobile Commerce and Related Mobile Security Issues
Ashish Wadhaval#1, Rugved Mehta#2, Ashlesha Gawade#3
#
Information Technology, Mumbai University
Padmabhushan Vasantdada Patil Pratisthan's College Of Engineering, Sion, Mumbai.
Abstract: This article will discuss how m-commerce conducts
transactions of the mobile device through
Internet and how these technologies are developed throughout
the years. The article will also judge the security and privacy
levels when dealing with mobile commerce and what kind of
issues are encountered when using mobile commerce systems.
The article will also evaluate the solutions on how m-commerce
issues are avoided and how they are tackled by the technology
evolution.
Keywords: M-commerce, security and privacy issues, mobile
devices, network.
illustrate the great potential of the m-commerce, we just
mention some potential applications: selling and buying of
different goods, mobile inventory management (tracking the
location of goods and services), proactive service management
(transmitting information about aging components, such as
automobile parts, to the vendors), wireless reengineering
(Improving business services), mobile auction and reverse
Auction, mobile entertainment services, mobile office
(services for business people, such as traffic jam reports,
airport and flight information, procurement of products and
services), mobile distance education (offering classes using
streaming audio and video), wireless data centre (providing
downloadable information from data warehouses), and others.
1. INTRODUCTION
2. ISSUES
M-commerce is a term that is used to refer to the growing
practice of conducting financial and promotional activities
with the use of a wireless handheld device. The term mcommerce is short for mobile commerce, and recognizes that
the transactions may be conducted using cell phones, personal
digital assistants and other hand held devices that have operate
with Internet access. While still in its infancy, the concept of
m-commerce has been refined in recent years and is beginning
to become more popular.
One of the basic examples of m-commerce has to do with
receiving sales promotions via the hand held device. The most
common
application
would
involve
the service
provider sending text messages to the subscriber that promote
new product offerings, free trials on additional services, or
other types of promotional campaigns. The subscriber is not
charged a fee for the text message, and often can respond with
a return text message without incurring any type of fee.
Several major cellular services off subscribers to opt into this
type of m-commerce, or be excluded from receiving the
messages.
Benefits of mobile commerce:
THAT CONCERN M-COMMERCE IN
TERMS OF SECURITY AND PRIVACY.
Security threats in mobile commerce can range from passively
eavesdropping into others’ message to actively stealing user’s
data. In a radio frequency operated mobile commerce, with
minimum difficulty it is possible to listen to one’s
conversation. This has an impact for consumers because they
are concerned about their data and voice messages from
unauthorised access. On the other end of the problem is the
inherent security risk involved in transferring information
over the networks. This problem consists of two components:
identification integrity and message integrity. The
identification integrity refers to the signature elements found
in the messages in order to establish where the message is
originating. The message integrity refers to details to establish
that the message is received as sent and no third party has
attempted to open, modify or alter the contents. According to
Zhang and Lee, these two items appear to cause a lot of
concern to both sender and receiver.6
While the sender risks theft or misuse of their personnel
information such as account and bank details, the receiver
(usually a merchant) risks repudiation of the transaction and
resultant non-payment.
According to some market research institutes, by 2004 at least
40 % of customer-to-business e-commerce will come from
smart phones using the WAP. Many new applications are
becoming possible, and many existing e-commerce
applications can be modified for a mobile environment. To
ISSN: 2231-5381
http://www.ijettjournal.org
Page 668
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
A. SECURITY ISSUES RELATED TO THE NETWORK
TECHNOLOGIES.
Network security is becoming more and more important as
people spend more and more time connected. Compromising
network security is often much easier than compromising
physical or local security, and is much more common.
Increasing online transactions personal and sensitive
information shared over network. Confidentiality to MAC
frames.
Authentication
Process of verifying identity of a user
Mobile commerce is an emerging market. As with any
emerging market there are significant opportunities and
significant risks. The temptation at this stage is for key players
to impose their own rules based on their own business models.
Although this can be beneficial for a few in the short-term and
in some markets may be the only way to start doing mobile
commerce, in the long-term this will have a negative impact
on business because lack of interoperability and higher
operating costs will create barriers to growth and adoption.
However a dynamic market needs an environment that favours
innovation and a diversity of stakeholders.
5. CONCLUSION:
Integrity
Data that arrives is the same as that is sent
Confidentiality
Sensitive information should not be visible to eavesdropper use
Encryption
Non-repudiation
Assurance that any transaction that takes place can
subsequently be proved to have taken place
Authorization
Assigning access rights to users
3. SOLUTIONS
ON HOW TO SOLVE THE MAIN
ISSUES OF MOBILE COMMERCE:
Mobile payments is one of the most dynamic sectors in the
global economy, with disparate technologies and business
models targeting various markets depending on how mobile
users choose to transact. As new mobile payment networks
emerge, consumers' payment options for virtual and actual
goods will expand. Notwithstanding the challenges of
increased merchant competition, high deployment costs and
consumer confusion, there is a market need for a true end-toend m-payment solution that merchants can immediately use
to drive consumer behaviour and additional revenues.
The m-payment opportunity
Consumers have an immense appetite for transacting on
mobile devices. A recent Forrester report pegs U.S. mcommerce revenues at $6 billion for 2011, with expected
growth to $31 billion by 2016. However, for the market to
accept a ubiquitous mobile payment model and embrace a
new era where consumer engagement unites with commerce,
solution providers have a lot of work ahead.
ISSN: 2231-5381
4. DISCUSSION:
In conclusion, the article has looked at some of the most
sensitive areas of the new mobile commerce such as, bank
transaction systems, online shopping because it engages with
large amounts of money every day. Therefore the system used
for transactions has to absolutely secure and to be free of
corruption as mentioned earlier in the article; business will
lose customers if the mobile security system is not secure
enough. On the other hand the article also discussed the
variety of ways of how our mobile commerce works and how
it is been improved through the years. It also showed the
protocols that have been developed in order to make our
mobile commerce safe and secure from fraud.
6. REFERENCES:
[1] Computer Networks, 4th Edition (Prentice Hall) - Andrew S
Tanenbaum - Chapter 8
[2] Wikipedia
[3] Ali Grami and Bernadette H. Schell, Faculty of Business and Information
Technology University of Ontario
Institute of Technology ali.grami@uoit.ca and bernadette.schell@uoit.ca,
[Future Trends in Mobile Commerce:
Service Offerings, Technological Advances and Security Challenges] (2002).
[4] A.V. Dang, E-Business raises transaction security concerns (Gartner
Advisory, 2000).
[5] Dang, E-Business raises transaction security concerns
[6] Ravi Tandon , Swarup Mandal and Debashis Saha, (M-Commerce-Issues
and Challenges), (2009).
[7] Sanwar ALI, Indiana University of Pennsylvania Department of Computer
Science Indiana, Waleed FARAG,
Zagazig University Department of Computer and Systems Engineering
Zagazig, Egypt, Mohammad A. ROB,
Management Information Systems University of Houston- Clear Lake
Houston, (Security Measures in Mobile
Commerce: Problems and Solutions), (2001).
[8] Seema Nambiar, Chang-Tien Lu, Department of Computer Science
Virginia Polytechnic Institute and State
University, (Analysis of Payment Transaction Security in Mobile Commerce),
(2004).
[9] Stefan Weiss, (Security and Privacy in Mobile Commerce), (2006).
[10] Sanjeev Banzal, (Mobile Banking & M–Commerce and Related Issues),
(2010).
[11] A. S. Andreou, C. Chrysostomou, C. Leonidou, S. Mavromoustakos, A.
Pitsillides, G. Samaras, C. Schizas,
http://www.ijettjournal.org
Page 669
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
(MOBILE COMMERCE APPLICATIONS AND SERVICES: A DESIGN
AND DEVELOPMENT APPROACH),
(2003).
200
[12] Shintaro Okazaki College of Economics and Business Administration
Autonomous University of Madrid, Spain,
(NEW PERSPECTIVES ON M-COMMERCE RESEARCH), (2005).
[13] COMMITTEE ON CONSUMER POLICY (CCP), July (2009).
[14] Scarlet Schwiderski-Grosche, Heiko Knospe. (secure M-commerce),
(2000).
[15] Suresh Chari1, Parviz Kermani, Sean Smith, and Leandros Tassiulas,
(Security Issues in M–Commerce: A Usage–
Based Taxonomy), (2006).
[16] Niels Christian Juul and Niels Jorgensen, (Security Issues in Mobile
Commerce Using WAP), (2002).
[17] Linck, K., Pousttchi, Key and Wiedemann, Dietmar Georg University of
Augsburg, (Security Issues in Mobile
Payment from the Customer Viewpoint), (2006).
[18] (M-Commerce and its Security Issues) By SAMEER YADAV (2001).
[19] Journal of Theoretical and Applied Electronic Commerce Research,
(Special Issue on M-Commerce), AUGUST
(2007).
[20] (M-commerce security white paper key security techniques) by Diarmuid
Malloon, version 1.1 march (2010).
ISSN: 2231-5381
http://www.ijettjournal.org
Page 670
Download