CONTACT: +91 9949712255, info@usharama.inCounselling Code: URCE

Security Issues in Mobile Commerce

Posted By: Usha Rama, 10/15/2020 08:51

Security Issues in Mobile Commerce

Abstract

Due to the arrival of the Internet, we can see huge electronic business transactions exploring around the globe. Along with the Internet, the wireless technology has also exponentially developed as well. Today, new technologies which allow cellular phones and other handheld devices to access the Internet have made wireless business transactions more possible. This phenomenon is known as M-Commerce or mobile commerce. It has been predicted that the number of mobile phones connected to the mobile Internet will go beyond the number of Internet-connected PCs before 2006. These mobile phones will, therefore, become the most widespread devices for accessing the Internet. Several industry experts predicted that M-commerce will represent a multibillion-dollar business by the end of 2005. However, there are many new challenges in providing information security as information travels through multiple networks often across wireless links. What must be done to protect financial transactions via mobile commerce? Generally speaking, M-Commerce creates added security concerns than traditional E-Commerce.

Introduction

The appearance of various technologies and applications has been in cognizance over the years, which are heading for at mobile computing and the web. Mobile commerce is known to be a significant functionality of the electronic commerce if not the most important type of electronic commerce. This form of commerce will be majorly included transaction activities being carried out over these new technologies as well as applications. Today E-commerce has enhanced the focus on security both for systems and also for messaging and transactions. If we see the recent advancement in the handheld personal assistant (PDAs), wireless communication technologies and enveloping infrastructure promise to extend comfort in the environment for mobile users-commerce transactions can be performed over ad-hoc wireless networks or adhoc m-commerce which can be considered as wireless trading outside established computer networks. While M-commerce has made life much easier for many people around the globe as the daily transactions are being carried out wirelessly which is more convenient but with that it poses some security threats. M-commerce = e-commerce + wireless web.

MOBILE COMMERCE SYSTEM

Mobile commerce is defined as the delivery of e- commerce competence directly into the customer’s hand. Wherever through wireless technology was initially coined by Kevin Duffey in 1997; the unplanned mobile commerce takes place between multiple numbers of nodes which are nearness of each other without relying on the services of any infrastructure.

  • Properties of Mobile Commerce

Independent service provider – The adhoc wireless networks are self-organized, that is the reason they do not have a network service infrastructure, nor a devoted service provider won’t be consigned for allocating maintenance task to allow security parameter or payment scheme for m-commerce applications.

Restricted scope of communication – Different communication restrictions especially the IEEE 802.11 carry great challenges in adhoc networks by rendering less security on third party services due to the dynamic network topology.

Impulsive choice in adhoc configuration – Equipped clients with mobile devices automatically engage in m- commerce when on the mobile mode as the adhoc wireless network possesses a self-organizing characteristic.

Cost effectiveness – Peer nodes frame the network, hence no additional complex device in the m- commerce application to perform security operations.

Privacy – No third party is required in achieving a network communication which is very suitable for the maintenance of the privacy protocol in commercial transactions.

  • Applications of m-commerce

There are numerous variety of m-commerce that can be conducted over adhoc wireless networks.

Digital resource quality-Exchange of digital contents such as music, videos, images, eBooks, etc.

Auction in M-commerce-An auction process can be performed anywhere as long as a group of at least 3 peer nodes with mobile devices and shared software are in mutual agreement to participate in the process, multicasting among participant can distribute bids information about what information related to an offer.

Machine enabled transaction-Various online transactions which use mobile devices are equipped with electronic cash in order to make compensation at a point of sale (POS) and so on via technology.

Mobile Banking-Most of the banks in existence nowadays offer online banking through the aid of mobile software where an entity could easily have access to his account and engage in any form of credit or debit transactions.

Amusement products-With the increase of interactive gaming products; your peers tend to play games or place a bet remotely without being present at the centres so as casinos.

SECURITY THREATS ARISING FROM

  • M-COMMERCE

Mobile commerce operated on a radio frequency platforms prone to passive attacks e.g. (snooping i.e. eavesdropping on a network) or listening to ongoing conversation. Consumers have great concerns about the information they share while participating parties either data or voice messages or both from un-authorized party gaining access. On the other hand, identification integrity and message integrity are also involved in mobile security.

Unfortunately, the current platform in which mobile communication is built on does not offer full scale security measures when it comes to transaction integrity.

The mobile adhoc wireless networks have some limitations in particular which needed to be taken into consideration. These issues are discussed briefly below.

Transaction Management-The in-depth idea of transaction can be difficult to enforce and network intermitted disconnections will affect a particular service in a secure m-commerce operations, succession to fail accordingly the secure connectivity would be considered unfinished and will be subjected to abort.