Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1971519.1971591acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Security framework for mobile banking

Published: 08 November 2010 Publication History

Abstract

The banking sector is always looking for new services delivery platforms to improve customer confidence and satisfaction. To achieve this, the banking service delivery platform must provide end-to-end security to safeguard the information exchange between the bank and the customer. With the increased penetration of mobile phones in the market place the banks are looking for mobile phones as the major revenue generating platform for the delivery of banking and financial services. Today a number of banks offer mobile banking service to their customers. However, still banks have been adopting the generic user authentication systems that was developed for the desktop environment or other complex authentication systems with a number of user intrusive activities. Therefore, the usability and adoption of the mobile banking technology has been extremely slow. This paper presents a novel authentication and authorization framework for secure mobile banking applications. The proposed protocol enables users to authenticate with the banking services with minimum user interactions but with novel advance security features.

References

[1]
Howard Wilcox (2009), Mobile Banking Strategies, Applications & Markets 2008--2013, Juniper Research Limited, January 2009
[2]
Mobile Banking Overview (2009), Mobile Banking Association, version 1.0, December 2009.
[3]
Interworking of Liberty Alliance ID-FF, ID-WSF and Generic Authentication Architecture, Technical Report, 3GPP 3rd Generation Partnership Project, 3GPP TR 33.980; Technical Specification Group Services and System Aspect, Release 4, version 1.0.0., July 2007.
[4]
I. M. Kalden, R. and M. Meyer (2000), Wireless internet access based on GPRS, IEEE Personal Communications, vol. 7, no. 2, pp. 8--18.
[5]
CREMERS, C. (2008). The Scyther Tool: Verification, falsification, and analysis of security protocols. In Proc. of the 20th Int. Conf. Computer Aided Verification (CAV'08). Lecture Notes in Computer Science, vol. 5123. Springer Verlag, 414--418.
[6]
Mobile Money for the Unbanked, Annual Report 2009, GSM Association
[7]
A. K. Lenstra and E. K. Verheul (2001). Selecting cryptographic key sizes. Journal of Cryptology, 14(4):255--29

Cited By

View all
  • (2016)Secure Multi-Purpose Mobile-Banking Using Elliptic Curve CryptographyWireless Personal Communications: An International Journal10.1007/s11277-016-3393-790:3(1331-1354)Online publication date: 1-Oct-2016

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MoMM '10: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
November 2010
441 pages
ISBN:9781450304405
DOI:10.1145/1971519
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • IIWAS: International Organization for Information Integration
  • Web-b: Web-b

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 November 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. mobile banking
  2. mobile data security
  3. parameter based access control

Qualifiers

  • Research-article

Conference

MoMM '10
Sponsor:
  • IIWAS
  • Web-b

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)22
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Secure Multi-Purpose Mobile-Banking Using Elliptic Curve CryptographyWireless Personal Communications: An International Journal10.1007/s11277-016-3393-790:3(1331-1354)Online publication date: 1-Oct-2016

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media