Development of a Secure Mobile E-Banking System

Raphael Olufemi Akinyede, Odoseiye Aidohelen Esese

Abstract


Mobile banking refers to the usage of a telephone or different cellular device to carry out on-line banking responsibilities. Those responsibilities encompass account balance enquiry, funds transfer, bill payment, finding an ATM, etc. Considering the excessive fee of adoption of this technology, quite a few concerns are raised as regards user authentication, data confidentiality, non-repudiation, data integrity and service availability. This research, therefore, introduces a more advantageous comfortable model to help conquer challenges mentioned earlier. In other to attain the set goals, the proposed model uses a popular salted Secure Hash Algorithm (SHA-512) Cryptographic Hash Algorithm to hash personal information, which include account information, and passwords. Advanced Encryption Standard (AES) approach was used for encryption and decryption, One Time Password (OTP) also turned into used to beef up user authentication. The design was carried out using Hypertext Preprocessor (PHP), JavaScript, CSS and MySQL database. Cain and Abel that is a password recovery tool that allows smooth recovery of various passwords by sniffing the network, cracking encrypted password using dictionary, brute-force and cryptanalysis attacks, revealing password bins, uncovering cached passwords and analyzing routing protocols was used to envision the validity and dependability of the model and also to obtain result. Results obtained suggests that the model is viable as data encrypted and hashed could not be decrypted by an attacker compared to other existing models.


Keywords


mobile banking; security; cryptography; encryption; decryption.

Full Text:

PDF

References


. P. Luarn and H. H. Lin, “Towards an understanding of the behavioural intention to use mobile banking”. Computers in Human Behaviour, 21, 873-891, 2007

. Z. Liao and M. T. Cheung, “Internet-based E-Banking and Consumer Attitudes: An Empirical Study”. Information and Management, Vol. 39, pp. 283–295, 2011

. O. K. Boyinbode and R. O. Akinyede, “Mobile Learning: An Application Of Mobile And Wireless Technologies In Nigerian Learning System”. IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.11, November 2008

. W. B. Nyamtiga, S. Anael and L. S. Laizer, “Enhanced Security Model For Mobile Banking Systems In Tanzania”. International Journal Of Technology Enhancements And Emerging Engineering Research, Vol 1, Issue 4 4 ISSN 2347-428. 2013

. A. Menezes, P. V. Oorschot and S. Vanstone, “Handbook of Applied Cryptography”, CRC Press, New York, 2007, p. 81-83.

. H. El-Gohary, “E-Marketing in Developed and Developing Countries: Emerging Practices”. Birminghan City University Business School, 2011

. Tiwari, “Handbook of Security”, Foundation of Computer Science FCS, New York, USA, 2007

. CA, San Francisco, “Mobile banking adoption and related financial services in US 2011-2018”. https://www.javelinstrategy.com/press-release/mobile-device-boom-led-74000-new-mobile-bankers-day-2014

. Javelin Strategy and Research, “Mobile Banking, Smartphone, and Tablet Forecast.” https://www.javelinstrategy.com/coverage-area/2015-mobile-banking-smartphone-and-tablet-forecast, 2015

. C. Lamb, J. Hair, and McDaniel. “Marketing”. New York: South – Western College Publishing. 2000

. B. F. Adesinasi, “Mobile Banking Adoption and Consumer Behaviour.” M.Sc. Thesis Submitted in support of GLOBAL MARKETING. London School of Business and Finance. 2012

. Wikipedia, “Consumer”. https://en.wikipedia.org/wiki/Consumer, 2017

. G. Schiffman, and L. Kanuk, “Consumer Behaviour”. New Jersey: Prentice Hall, Inc, 2000.

. S. Kungspisdan, “Modelling, Design, and Analysis of Secure Mobile Payment Systems”. 5th International Workshop on Information Security Applications (WISA2004) [KLS05].2005

. L. L. Johnny, B. Judith and J. H. P. Eloff, “SMSSec: An end-to-end protocol for secure SMS”, Developing Mobile Java Applications. Upper Saddle River, New Jersey: Prentice Hall, 174-179.2008

. R. O. Akinyede, O. S. Adewale and B. K. Alese, “Securing Mobile Payment Systems: Using Personal Identification Number (PIN) Method.” Proceedings of the International Conference on Software Engineering and Intelligent Systems July 5th-9th, Ota, Nigeria. 2010

. J. Liu, “Design and Implementation of Mobile Payment Scheme based on WPKI and WAP Technology”. Journal of Convergence Information Technology(JCIT) Volume8, Number15, October 2013.

. M. Niranjanamurthy, “Analysis of E-Commerce and M-Commerce: Advantages, Limitations and Security issues”. International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 6, June 2013

. S. N. Geeta, S. J. Swati and A. D. Aaradhana, “M-Banking Security – a futuristic improved security approach”. IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 www.IJCSI.org.

. N. Mallat, M. Rossi and V. Tuunainen, “Mobile Banking Services”, Communications of the ACM, 47(8), 42-46. 2004

. J. Brainard, A, Juels, R. L. Rivest, M. Szydlo and M. Yung, “Fourth-Factor Authentication: Somebody You Know”, ACM CCS, 2006, 168-78.

. F. Aloul, S. Zahidi, and W. El-Hajj, “Two Factor Authentication Using Mobile Phones.” AICCSA 2009. IEEE/ACS International Conference on Computer Systems and Applications. 2009

. R. O., Akinyede, “Modelling a Secure e-Commerce Payment System for Wireless (Mobile) Network in Nigeria.” Ph.D Thesis submitted to The Federal University of Tech. Akure, Nigeria. 2012

. S. Parikshit, “Secure hashing algorithm” http://www.secure-hash-algorithm-md5-sha-1.co.uk/ 2009

. Tutorialpoint, “Advanced Encryption Standard. Simply easy learning”. All Rights Reserved. http://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm, 2016

. K. Czesław, K. Mirosław and S. Marian, “Modern Cryptography Primer: Theoretical Foundations and Practical Applications”. Springer Science & Business Media. https://books.google.com.ng/books?isbn=3642413862, 2013

. Federal Information Processing Standards –FIPS, “Advanced Encryption Standard (AES)”. Federal Information Processing Standards Publications. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, 2001


Refbacks

  • There are currently no refbacks.


 

 
  

 

  


About IJC | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJC is published by (GSSRR).