New Financial Transaction Security Concerns in Mobile Commerce
New Financial Transaction Security Concerns in Mobile Commerce
New Financial Transaction Security Concerns in Mobile Commerce
I&S
Raj GURURAJAN
Introduction
In the past, the majority of the computer security officers had difficulty in convincing
management to allocate financial resources for IT security. However, with the
emergence of electronic commerce and varied legislation, organisations appear to
have understood the necessity for computer security, especially data security.1
Currently, in most organisations, security officers focus on IT security – namely –
hardware security, software security and access security.2 The access security
involves both physical access and logical access. What appears to be missing from
these security procedures is proper integration of business transactions. Ghosh states
that while various security measures have been taken independently from business
transaction, electronic commerce and the emerging mobile commerce have changed
the perception that independent IT infrastructure security alone can protect an
organisation in terms of its business needs.3 To support Ghosh’s statement, Deise 4
has identified a shift in the focus of IT security in organisations, resulting in new
security policies to focus on reliable, available and trusted business transactions of
organisations.
In this paper, new security threats arising from mobile commerce are initially
highlighted. These threats are then linked to financial transactions in order to
highlight the potential loss or damage to organisations’ revenue. Then the
organisations’ IT requirements are assessed with a view to provide support to
financial transactions in a mobile commerce environment. Organisational support is
then formed into “architecture” and the architecture is discussed in terms of IT in an
organisation, how IT supports an organisation and what does IT do to support the
business processes of financial transactions. This architecture is then elaborated in
terms of action items so that transaction security in an organisation can be
guaranteed. It is believed that these action items would then enable organisations to
tighten their security measures.
in the new network in order for the requests to be processed. In the process of
translating one protocol to another, the data is decrypted and then re-encrypted. This
process is commonly known as the “WAP Gap.” If an attacker can gain access to the
mobile network at this point, then simply capturing the data when it is decrypted can
compromise the security of the session.
Data in the Mobile Commerce environment is secured using encryption technology.
According to Ghosh, it has already been proven that the technology is vulnerable to
attacks.9 Hackers have broken some of the existing algorithms for encryption. So,
there is nothing like a complete security. Further, there is no international regulatory
framework available to enforce certain security related problems. For example, in the
current climate, no individual organisation or government can guarantee security to
consumers. When the security breach appears in an international transaction, no one
country will be able to assume responsibility to prosecute the vandals. While these
problems have been recognised and solutions are being proposed, organisations tend
to loose consumer confidence. This will potentially impact organisation’s revenue.
Trust is central to any commercial transaction and more so in the case of mobile
commerce.10 Trust is normally generated through relationships between transacting
parties, familiarity with procedures, or redress mechanisms. In the case of mobile
commerce, the need for creating the trust in the consumer assumes extreme
importance because of its virtual nature. It hinges on assuring consumers and
businesses that their use of network services is secure and reliable, that their
transactions are safe, that they will be able to verify important information about
transactions and transacting parties such as origin, receipt and integrity of
information, and identification of parties dealt with. Therefore the challenge is not to
make mobile Commerce fool proof but to make the system reliable enough so that the
value greatly exceeds the risk.
Any new development in technology in today’s consumer minds creates both
curiosity as well as reluctance. The informality and lack of overall control creates the
perception that the Internet is inherently insecure.11 This inherent perception can
trigger business risks and technological risks.12 Business risks involve products and
services, inadequate legal provisions, reliability of trading partners, behaviour of staff
and demise of Internet service provider. Technological risks involve hacker attacks,
computer viruses, data interception and misrepresentation. To achieve satisfactory
levels of trust, organisations have to think about managing both business and
technological risks. Currently Mobile Commerce relies mostly on knowledge-based
trust that is useful for Business-to-Business commerce.13 However, there is a big
surge in the identification-based trust to satisfy consumer concerns about their
transaction details. In addition, current architectures for mobile communications do
not provide full security measures in terms of transaction integrity. Some of the
74 New Financial Transaction Security Concerns in Mobile Commerce
models envisaged for mobile commerce are based on smart-cards oriented approach
and hence the issue of financial transaction security needs greater examination in
mobile commerce.
that the use of misappropriated information may harm third parties such as customers,
employees, and business partners.18 The theft of information may undermine an
acquisition or cause a public relations problem and hence potential loss of revenue.
Security breaches may be very costly to an organisation.19 When unauthorised access
to the computer is gained for the purposes of committing a crime or fraud, reputation
is also at stake. Other security issues include the prohibition against the use of high-
level encryption technology by domestic or foreign governments so that agencies can
break the codes if necessary for defence or law enforcement, changes in international
standards, and loss of recovery of encryption key.
According to Lee, service denial may cause a customer business interruption, network
suspension, or a disruption in or delay of services.29 Service denials may result in
damage claims or lawsuits for breach of contract.
aspect is essential for an organisation to ensure that transactions are reliable and
secure. Finally, to accommodate diversity of user needs, applications assume a key
component role in mobile commerce.
With these four key components in mind, when organisations’ IT requirements are
assessed, importance should also be given to “user experience.” In mobile commerce
environment, these user experiences typically involve cameras, music and other
emerging innovative technologies such as positioning systems and, hence,
organisations should find a way to accommodate these ever changing user
experiences. Organisations would then be tempted to add additional hardware and
software resources to their existing infrastructure but this will increase the financial
burden of an organisation. One emerging suggestion appears to be the consideration
of “interface” facilities to enable sharing other third-party resources. This requires
address and connectivity mechanisms that do not exist today. While recent newspaper
articles forecast such capabilities are emerging, the bigger challenge for organisations
is to create applications that truly have this multi-modal, multi-channel character
because it is believed that the immediacy of wireless technology is great.
With this scope in mind, if we analyse an organisations’ IT infrastructure, then we
would be able to bundle business needs to support secure transactions into four main
groups. They are:
1. Technical infrastructure that can identify what is IT made up of in an
organisation;
2. Physical components of IT that can identify how these components support
various workflow requirements in an organisation;
3. Logical components that can identify how IT components support various
business processes; and
4. Real time measurement and control of security and service levels in real
time.
While the first three points provide essential components of an application
architecture in an organisation, the fourth point provides the control and maintenance
components of the application architecture. This real time control is essential in
mobile commerce because of the difficulty in describing complete security
architecture to ensure security of transactions.
The Architecture
Figure 1 represents the proposed architecture that attempts to address various new
security concerns. The architecture consists of 10 levels, starting from level 0. Level
0 is where all security policies to ensure transaction security are dealt with. This is a
80 New Financial Transaction Security Concerns in Mobile Commerce
and authorisation is becoming out of use in mobile commerce while the new dynamic
privilege management is becoming an essential component. Therefore, risk
management associated with organisations’ IT security also needs to be dynamic and
in real time to react to incidents and also to address potential threats more pro-
actively. In essence, level 0 of the architecture will ensure that customers, business
partners, and other stakeholders of a transaction such as banks and governments
interact directly with these business applications and their IT environments,
especially mobile environments. This level 0 architecture will ensure that the
transaction environment is up and running, reliable and secure.
Levels 1 to 3 put the customer first and they are specific to business needs. At this
level, several independent business activities are integrated through IT applications in
order to ensure that data, functions and workflow modules of various business needs
in an organisation are synchronised. Due to increasing demands from customers, the
visibility and interaction across the supply chain to the customer is essential in mobile
commerce. Therefore, manual sub-transactions usually found in a traditional
transaction (including weaker electronic commerce models) need to disappear and
levels 1-3 will ensure that this happens in an organisation.
Levels 4-6 consist of the various physical modules to support the workflow. These
levels also consist of “code” needed to support workflow and integration of
workflow. These levels are of extreme importance to business because this is where
the integration of multiple segments of a business, such as Customer Relationship
Management (CRM) and Supply Chain Management (SCM), takes place. Further,
due to the physical nature of IT components, this is where the existing resources are
integrated with new resources. To establish financial security, levels 4-6 need to be
maintained properly because the transaction is split into multiple components at these
levels before the transaction is processed. Further, when the transaction is split into
component sub-transactions, each of the sub-transactions may run on varied systems
with different infrastructures. Organisations should focus their “security” at this level
for successful mobile-commerce.
The last three levels comprise of IT components in order to realise various
combinations of business needs. At this level, IT components such as a computer are
added to the existing infrastructure. While the previous levels (4-6) facilitate business
needs, levels 7-9 actually implement them. Issues such as network speed, transaction
completion time are essential characteristics at these levels. While the business
performance is measured at the previous levels, response time measurement is
conducted at the last three levels (7-9). These three levels are vulnerable to attack and
implementation of security procedures starts at these levels.
82 New Financial Transaction Security Concerns in Mobile Commerce
Discussion
When a financial transaction is facilitated in a mobile commerce environment, usually
the consumer accesses the organisation’s computer to search for appropriate details.
Once the consumer is satisfied with his/her order, an order is placed. The consumer
places an order using the infrastructure provided by the Internet storefront and using
his or her payment method of choice. Once the order reaches the organisation, the
transaction is processed. A number of security issues such as verifying the credentials
of the consumer arise at this point. Provision for real-time security and connectivity
to authorise payment via the Internet or wireless medium forms an integral
component of the transaction. The organisation involved in the transaction channels
the transaction through various financial networks such as banks, ensuring that
customers are authorised to make their purchase.
While security issues are applied onto a transaction, usually client/server architecture
is used to perform transaction processing. The client is installed on the organisation’s
merchant site by the third-party providing user authentication for financial details and
this client is integrated with mobile commerce application. The client is usually pre-
integrated with store management systems, such as those for management reporting
purposes.
For the purposes of transaction authorisation, the client software establishes a secure
link with the processing server over the Internet using an SSL connection, and
transmits the encrypted transaction request. The server, which is a multi-threaded
processing environment, receives the request and transmits it over a private network
to the appropriate financial processing network.
Depending upon the consumer’s financial status, the transaction is approved or
denied. When the authorisation response is received from the financial network, the
response is returned via the same session to the client on your site. The client
completes the transaction session by transparently sending a transaction receipt
acknowledgement to the server before disconnecting the session.
The whole transaction is accomplished in few seconds, including confirmation back
to the customer and the organisation. If the transaction is approved, funds will be
transferred to the organisation’s account. Once the transaction is confirmed, the
transaction will be securely routed and processed. As proof of a securely processed
transaction, both the customer and the organisation will receive a transaction
confirmation number.
The transaction processing cycle is presented on Figure 2.
Raj Gururajan 83
Organisation’s
Credit Card Financial
Internet
Processing Networks
Storefront
Consumers
Consumer’s
Issuing Bank
The architecture described in this paper supports almost all the elements of the
transaction that can be conducted in the organisation. The security aspects not only
involve the organisational IT infrastructure but also third-party security levels in
order to approve a financial transaction. It should be remembered that consumers
expect the organisation to facilitate a reliable and secure transaction and it is in the
interest of the organisation that third parties involved in the transaction are reliable
and capable of providing necessary security to consumer’s transactional details.
While the above diagram portrays a complete financial transaction system, the
following two diagrams portray the component that needs to be supported by an
organisation. Components such as office systems form the levels 7-9 in the
architecture outlined in this paper. Components such as databases would form the
levels 4-6 in the architecture described above. Other components such as Business
Logic Components form levels 1-3 of the architecture. The business processing for
facilitation of transaction is also highlighted in the diagram on Figure 3.
84 New Financial Transaction Security Concerns in Mobile Commerce
Security
Systems
Trading
Financial
Systems
Systems
Customer
Systems
Conclusion
The architecture presented in this paper addresses various new security concerns in
the emerging mobile commerce. The architecture is derived in order to accommodate
various business processes as an integral component and security management
encompassing these business processes. It is believed that this architecture will assist
in avoiding issues such as loss of transaction authenticity because the business
process is integrated with the security procedures in the architecture. Further, the
business processes are kept in the centre of the architecture to enable transaction
confidentiality and integrity from an organisational point of view. Further, the
interdependence of various systems within the architecture is expected to provide
much needed real-time reaction to any causes of transaction unavailability in mobile
commerce.
While the architecture is only a conception, the inclusion of business process along
with IT security is expected to provide tight controls to management in terms of
financial transactions. This is rapidly becoming essential in the competitive world of
mobile commerce where the volume of transactions ensure healthy revenue to
Raj Gururajan 85
organisations. Therefore, the focus was set on transaction security. It is hoped that
this architecture will help organisations to get a head start to review their security
procedures and establish a better control on financial transactions.
Notes:
1
A.V. Dang, E-Business raises transaction security concerns (Gartner Advisory, 2000).
2
Dang, E-Business raises transaction security concerns.
3
A.K. Ghosh, Security and Privacy for E-Business (New York: Wiley, 2001).
4
M.V. Deise, et al., Executive's Guide to e-Business: From Tactics to Strategy (New
York: John Wiley & Sons, Inc., 2000).
5
M. Loney, “M-Commerce safety fears,” in IT Week (2000), p. 6.
6
Y. Zhang, and W. Lee, “Intrusion detection in wireless ad-hoc networks,” in ACM/IEEE
MobiCom (2000).
7
Zhang and Lee, “Intrusion detection in wireless ad-hoc networks.”
8
G. Hulme, “Services Seeks to Bring e-Business to Small Businesses,” in
Informationweek.com (2000), p. 21.
9
Ghosh, Security and Privacy for E-Business.
10
D. Fink, “Developing trust for Electronic Commerce,” in Internet and Intranet: Security
and Management: Risks and Solutions, ed. L. Janczewski (Idea Group Publishing, 2000),
p. 44-86.
11
J. Schiller, Mobile Communications (New York: Addison-Wesley, 2000).
12
S. Shroeder, Wired for business. Risk Management, 1999(March): p. 12-22.
13
Fink, “Developing trust for Electronic Commerce.”
14
P. Judge, “Little guys still say NO to the net,” Business Week (1998): 134.
15
D. Young, “Handicapping M-Commerce: Getting ready for wireless e-commerce,”
Wireless Review (August 2000): 24-30.
16
Deise, et al., Executive's Guide to e-Business: From Tactics to Strategy.
17
A.V. Dang, Four action items for E-Business: Transaction Security (Gartner Advisory,
2000).
18
R. Dornan, The essential guide to wireless communication applications (Upper Saddle
River, NJ: Prentice Hall PTR, 2001).
19
M. Gerrard, Organising for E-Business: Getting it right (Gartner Advisory, 2000).
20
G. Hulme, “Services Seeks to Bring e-Business to Small Businesses.”
21
Ghosh, Security and Privacy for E-Business.
22
J. Craig, and D. Julta, e-Business Readyiness: A Customer Focused Framework (Boston:
Addison Wesley, 2001).
86 New Financial Transaction Security Concerns in Mobile Commerce
23
Anonymous, E-Commerce is growing, in The Australian (2000).
24
B. Stowe, “Wireless networking looks attractive, but what about the cost of keeping it
secure?,” Infoworld (May 2000): 92.
25
Ghosh, Security and Privacy for E-Business.
26
R. Dornan, The essential guide to wireless communication applications; D. Smith and
W. Andrews, Exploring Instant Messaging (Gartner Research and Advisory Services,
2001); Anonymous, Wireless technology reaches behind the firewall.
27
M.V. Deise, et al., Executive's Guide to e-Business: From Tactics to Strategy.
28
A. Arena, “Asian Internet start-ups invests heavily in dot.coms,” Australian
communications (February 2000): 15-18.
29
A. Lee, “Small firms must take Internet plunge or risk being sidelined,” The Engineer 10,
(November 2000): 10.
30
T. Lewis, “Ubinet: The ubiquitous Internet will be wireless,” IEEE Computer 32, (1999):
10.
31
N. Langley, “Get moving on m-commerce,” in Computer Weekly (2000): p. 68.
32
S. Hayward, et al., Beyond the Internet: The Supranet (Gartner Advisory, 2000).
33
M. Gerrard, Organising for E-Business: Getting it right (Gartner Advisory, 2000).
34
Dang, E-Business raises transaction security concerns.
35
Dang, Four action items for E-Business: Transaction Security.
36
L. Koller, “Banks flirting with wireless billing,” in Bank Technology News (2000), p. 25.