Security in Next Generation Mobile Payment Systems: A Comprehensive Survey

被引:29
作者
Ahmed, Waqas [1 ]
Rasool, Aamir [1 ]
Javed, Abdul Rehman [1 ]
Kumar, Neeraj [2 ,3 ]
Gadekallu, Thippa Reddy [4 ]
Jalil, Zunera [1 ]
Kryvinska, Natalia [5 ]
机构
[1] Air Univ, Dept Cyber Secur, Islamabad 44200, Pakistan
[2] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[3] Univ Petr & Energy Studies, Sch Comp Sci, Dehra Dun 248007, Uttarakhand, India
[4] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[5] Comenius Univ, Fac Management, Bratislava 82005, Slovakia
关键词
Mobile handsets; Online banking; Security; Authentication; Business; Encryption; Standards; Mobile payment method; online system; transaction; mobile commerce; cyberattacks; ADOPTION; IMPACT; MONEY; AUTHENTICATION; INTENTION; LESSONS; SCHEME; USERS;
D O I
10.1109/ACCESS.2021.3105450
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cash payment is still king in several markets, accounting for more than 90% of the payments in almost all the developing countries. The usage of mobile phones is pretty ordinary in this present era. Mobile phones have become an inseparable friend for many users, serving much more than just communication tools. Every subsequent person is heavily relying on them due to multifaceted usage and affordability. Every person wants to manage his/her daily transactions and related issues by using his/her mobile phone. With the rise and advancements of mobile-specific security, threats are evolving as well. In this paper, we provide a survey of various security models for mobile phones. We explore multiple proposed models of the mobile payment system (MPS), their technologies and comparisons, payment methods, different security mechanisms involved in MPS, and provide analysis of the encryption technologies, authentication methods, and firewall in MPS. We also identify current challenges and future directions of mobile phone security.
引用
收藏
页码:115932 / 115950
页数:19
相关论文
共 120 条
[1]  
Ahmed Waqas., 2021, 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), P1
[2]  
Al-Janabi S. F., 2012, 2012 International Conference on Future Communication Networks (ICFCN), P135, DOI 10.1109/ICFCN.2012.6206857
[3]  
Al-Tamimi Mayada, 2017, 2017 8th International Conference on Information Technology (ICIT). Proceedings, P827, DOI 10.1109/ICITECH.2017.8079954
[4]   Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures [J].
Ali, Guma ;
Ally Dida, Mussa ;
Elikana Sam, Anael .
FUTURE INTERNET, 2020, 12 (10) :1-27
[5]   Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda [J].
Ali, Guma ;
Dida, Mussa Ally ;
Sam, Anael Elikana .
INFORMATION, 2020, 11 (06)
[6]  
Alsaadi I.M., 2015, Int. J. Sci. Technol. Res., V4, P285
[7]  
Altwairqi A.F., 2019, Int. J. Eng. Adv. Technol. IJEAT, V9, P2131
[8]   Authentication of Smartphone Users Using Behavioral Biometrics [J].
Alzubaidi, Abdulaziz ;
Kalita, Jugal .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03) :1998-2026
[9]  
[Anonymous], 2013, UK Academy for Information Systems Conference Proceedings
[10]  
[Anonymous], 2014, HOM DEP REP FIND PAY