skip to main content
10.1145/1971519.1971591acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Security framework for mobile banking

Published:08 November 2010Publication History

ABSTRACT

The banking sector is always looking for new services delivery platforms to improve customer confidence and satisfaction. To achieve this, the banking service delivery platform must provide end-to-end security to safeguard the information exchange between the bank and the customer. With the increased penetration of mobile phones in the market place the banks are looking for mobile phones as the major revenue generating platform for the delivery of banking and financial services. Today a number of banks offer mobile banking service to their customers. However, still banks have been adopting the generic user authentication systems that was developed for the desktop environment or other complex authentication systems with a number of user intrusive activities. Therefore, the usability and adoption of the mobile banking technology has been extremely slow. This paper presents a novel authentication and authorization framework for secure mobile banking applications. The proposed protocol enables users to authenticate with the banking services with minimum user interactions but with novel advance security features.

References

  1. Howard Wilcox (2009), Mobile Banking Strategies, Applications & Markets 2008--2013, Juniper Research Limited, January 2009Google ScholarGoogle Scholar
  2. Mobile Banking Overview (2009), Mobile Banking Association, version 1.0, December 2009.Google ScholarGoogle Scholar
  3. Interworking of Liberty Alliance ID-FF, ID-WSF and Generic Authentication Architecture, Technical Report, 3GPP 3rd Generation Partnership Project, 3GPP TR 33.980; Technical Specification Group Services and System Aspect, Release 4, version 1.0.0., July 2007.Google ScholarGoogle Scholar
  4. I. M. Kalden, R. and M. Meyer (2000), Wireless internet access based on GPRS, IEEE Personal Communications, vol. 7, no. 2, pp. 8--18.Google ScholarGoogle ScholarCross RefCross Ref
  5. CREMERS, C. (2008). The Scyther Tool: Verification, falsification, and analysis of security protocols. In Proc. of the 20th Int. Conf. Computer Aided Verification (CAV'08). Lecture Notes in Computer Science, vol. 5123. Springer Verlag, 414--418. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Mobile Money for the Unbanked, Annual Report 2009, GSM AssociationGoogle ScholarGoogle Scholar
  7. A. K. Lenstra and E. K. Verheul (2001). Selecting cryptographic key sizes. Journal of Cryptology, 14(4):255--29Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Security framework for mobile banking

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              MoMM '10: Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
              November 2010
              441 pages
              ISBN:9781450304405
              DOI:10.1145/1971519

              Copyright © 2010 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 8 November 2010

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader