Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures
Mansi Bosamia1 , Dharmendra Patel2
Section:Review Paper, Product Type: Journal Paper
Volume-7 ,
Issue-1 , Page no. 810-817, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.810817
Online published on Jan 31, 2019
Copyright © Mansi Bosamia, Dharmendra Patel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Mansi Bosamia, Dharmendra Patel, “Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.810-817, 2019.
MLA Style Citation: Mansi Bosamia, Dharmendra Patel "Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures." International Journal of Computer Sciences and Engineering 7.1 (2019): 810-817.
APA Style Citation: Mansi Bosamia, Dharmendra Patel, (2019). Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures. International Journal of Computer Sciences and Engineering, 7(1), 810-817.
BibTex Style Citation:
@article{Bosamia_2019,
author = {Mansi Bosamia, Dharmendra Patel},
title = {Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {810-817},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3589},
doi = {https://doi.org/10.26438/ijcse/v7i1.810817}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.810817}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3589
TI - Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures
T2 - International Journal of Computer Sciences and Engineering
AU - Mansi Bosamia, Dharmendra Patel
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 810-817
IS - 1
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
1222 | 497 downloads | 205 downloads |
Abstract
The volume of wallet payment transactions has considerably increased in the last decade. There are many wallets already has been developed and also new wallets coming in the market day by day for payment transactions in highly distributed environments. So far it has the focus on addressing only security issues. However, key important criteria of distributed processing such as performance, scalability, and availability. In this paper, we identify and analyze the different threats and vulnerabilities of a mobile cum web wallet application to obtain a high-level understanding of the various types of threats that may affect wallet applications with its possible security measures
Key-Words / Index Term
e-cash, mobile payment system, mobile wallet
References
[1] Dahlberg, Tomi, Niina Mallat, and Anssi Öörni. "Trust enhanced technology acceptance model-consumer acceptance of mobile payment solutions: Tentative evidence." Stockholm Mobility Roundtable 22 (2003): 23.
[2] Hoofnagle, Chris Jay, Jennifer M. Urban, and Su Li. "Mobile payments: Consumer benefits & new privacy concerns." (2012).
[3] Kasiyanto, Safari. "Security Issues of New Innovative Payments and Their Regulatory Challenges." In Bitcoin and Mobile Payments, pp. 145-179. Palgrave Macmillan UK, 2016.
[4] Khiaonarong, Tanai. "Oversight issues in mobile payments.", IMF Working Paper (July 2014).
[5] Hohl, Fritz. "Time limited blackbox security: Protecting mobile agents from malicious hosts." Mobile agents and security (1998): 92-113.
[6] Simplot-Ryl, Isabelle, Issa Traoré, and Patricia Everaere. "Distributed architectures for electronic cash schemes: a survey 1." International Journal of Parallel, Emergent and Distributed Systems 24, no. 3 (2009): 243-271.
[7] Security of Mobile Payments and Digital Wallets, ENISA December 2016, https://www.enisa.europa.eu/publications/mobile-payments-security/at_download/fullReport
[8] Allen, Hellen, 2003, “Innovations in Retail Payments: E-Payments”, Bank of England Quarterly Bulletin, Winter, pp. 428-438.
[9] Diniz, Eduardo Henrique, João Porto de Albuquerque, and Adrian Kemmer Cernev. "Mobile Money and Payment: a literature review based on academic and practitioner-oriented publications (2001-2011)." (2011).
[10] Urban, Jennifer. 2016. “Mobile Payments: Consumer Benefits & New Privacy Concerns”. SocArXiv. July 18. osf.io/preprints/socarxiv/7pnxz.
[11] Papathanasiou, Christian, and Nicholas J. Percoco. "This is not the droid you`re looking for..." Def Con 18 (2010).
[12] Davis, Michael, Sean Bodmer, and Aaron LeMasters. Hacking Exposed Malware and Rootkits. McGraw-Hill, Inc., New York, NY, USA, 2009.
[13] The Great Bank Robbery: Carbanak APT https://business.kaspersky.com/the-great-bank-robbery-carbanak-apt/3598/
[14] FIDO Alliance, “Specifications Overview”, http://fidoalliance.org/specifications/overview/
[15] https://en.wikipedia.org/wiki/Mobile_payment
[16] European Central Bank, “Recommendations For The Security of Mobile Payments”, https://www.ecb.europa.eu/paym/cons/pdf/131120/ recommendationsforthesecurityofmobilepaymentsdraftpc201311en.pdf
[17] ENISA,” Mobile Identity Management”, https://www.enisa.europa.eu/publications/Mobile%20IDM
[18] Drop Labs, “Rampant: Explaining the Current State of Apple Pay Fraud”, http://www.droplabs.co/?p=1231
[19] Apple, “About EMV and Apple Pay for Merchants”, https://support.apple.com/en-us/HT205645
[20] ISACA, ”2015 Mobile Payment Security Study”, https://www.isaca.org/Pages/mobile-payment-security-study.aspx
[21] Mobile Payment in Your Business", https://www.intelligenthq.com/resources/the-3-biggest-benefits-of-implementing-mobile-payment-in-your-business/
[22] Salvador Mendoza, “Samsung Pay: Tokenized Numbers, Flaws and Issues”, https://www.blackhat.com/docs/us-16/materials/us-16-Mendoza-Samsung-Pay-Tokenized-Numbers-Flaws-And-Issues-wp.pdf
[23] Zvelo, “Google Wallet Security: PIN Exposure Vulnerability”, https://zvelo.com/google-wallet-security-pin-exposure-vulnerability/
[24] Wonder How To, “ Apple Watch Vulnerability Lets Thieves Use Apple Pay Without Your PIN”, http://ios.wonderhowto.com/how-to/apple-watch-vulnerability-lets-thieves-use-apple-pay-without-your-pin-0161940/
[25] http://viaforensics.com/mobile-security/forensics-security-analysis-google-wallet.html
[26] MIT Technology Review, “Is Google Wallet Safe ?”, https://www.technologyreview.com/s/426921/is-google-wallet-safe/
[27] Choi, Daeseon, and Younho Lee. "Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay." In WOOT. 2016.
[28] Trend Micro Discovers MalumPoS; Malware Targeting Hotels and other US Industries http://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-discovers-malumpos-targets-hotels-and-other-us-industries/
[29] https://www.goodreturns.in/classroom/2016/11/types-mobile-wallets-their-difference-518655.html
[30] http://www.dqindia.com/top-6-mobile-wallets-in-india/2/
[31] http://www.iamwire.com/2016/11/list-of-mobile-wallets-upi-payment-apps-in-india/145172