Open Access   Article Go Back

Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures

Mansi Bosamia1 , Dharmendra Patel2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 810-817, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.810817

Online published on Jan 31, 2019

Copyright © Mansi Bosamia, Dharmendra Patel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mansi Bosamia, Dharmendra Patel, “Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.810-817, 2019.

MLA Style Citation: Mansi Bosamia, Dharmendra Patel "Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures." International Journal of Computer Sciences and Engineering 7.1 (2019): 810-817.

APA Style Citation: Mansi Bosamia, Dharmendra Patel, (2019). Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures. International Journal of Computer Sciences and Engineering, 7(1), 810-817.

BibTex Style Citation:
@article{Bosamia_2019,
author = {Mansi Bosamia, Dharmendra Patel},
title = {Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {810-817},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3589},
doi = {https://doi.org/10.26438/ijcse/v7i1.810817}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.810817}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3589
TI - Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures
T2 - International Journal of Computer Sciences and Engineering
AU - Mansi Bosamia, Dharmendra Patel
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 810-817
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
1222 497 downloads 205 downloads
  
  
           

Abstract

The volume of wallet payment transactions has considerably increased in the last decade. There are many wallets already has been developed and also new wallets coming in the market day by day for payment transactions in highly distributed environments. So far it has the focus on addressing only security issues. However, key important criteria of distributed processing such as performance, scalability, and availability. In this paper, we identify and analyze the different threats and vulnerabilities of a mobile cum web wallet application to obtain a high-level understanding of the various types of threats that may affect wallet applications with its possible security measures

Key-Words / Index Term

e-cash, mobile payment system, mobile wallet

References

[1] Dahlberg, Tomi, Niina Mallat, and Anssi Öörni. "Trust enhanced technology acceptance model-consumer acceptance of mobile payment solutions: Tentative evidence." Stockholm Mobility Roundtable 22 (2003): 23.
[2] Hoofnagle, Chris Jay, Jennifer M. Urban, and Su Li. "Mobile payments: Consumer benefits & new privacy concerns." (2012).
[3] Kasiyanto, Safari. "Security Issues of New Innovative Payments and Their Regulatory Challenges." In Bitcoin and Mobile Payments, pp. 145-179. Palgrave Macmillan UK, 2016.
[4] Khiaonarong, Tanai. "Oversight issues in mobile payments.", IMF Working Paper (July 2014).
[5] Hohl, Fritz. "Time limited blackbox security: Protecting mobile agents from malicious hosts." Mobile agents and security (1998): 92-113.
[6] Simplot-Ryl, Isabelle, Issa Traoré, and Patricia Everaere. "Distributed architectures for electronic cash schemes: a survey 1." International Journal of Parallel, Emergent and Distributed Systems 24, no. 3 (2009): 243-271.
[7] Security of Mobile Payments and Digital Wallets, ENISA December 2016, https://www.enisa.europa.eu/publications/mobile-payments-security/at_download/fullReport
[8] Allen, Hellen, 2003, “Innovations in Retail Payments: E-Payments”, Bank of England Quarterly Bulletin, Winter, pp. 428-438.
[9] Diniz, Eduardo Henrique, João Porto de Albuquerque, and Adrian Kemmer Cernev. "Mobile Money and Payment: a literature review based on academic and practitioner-oriented publications (2001-2011)." (2011).
[10] Urban, Jennifer. 2016. “Mobile Payments: Consumer Benefits & New Privacy Concerns”. SocArXiv. July 18. osf.io/preprints/socarxiv/7pnxz.
[11] Papathanasiou, Christian, and Nicholas J. Percoco. "This is not the droid you`re looking for..." Def Con 18 (2010).
[12] Davis, Michael, Sean Bodmer, and Aaron LeMasters. Hacking Exposed Malware and Rootkits. McGraw-Hill, Inc., New York, NY, USA, 2009.
[13] The Great Bank Robbery: Carbanak APT https://business.kaspersky.com/the-great-bank-robbery-carbanak-apt/3598/
[14] FIDO Alliance, “Specifications Overview”, http://fidoalliance.org/specifications/overview/
[15] https://en.wikipedia.org/wiki/Mobile_payment
[16] European Central Bank, “Recommendations For The Security of Mobile Payments”, https://www.ecb.europa.eu/paym/cons/pdf/131120/ recommendationsforthesecurityofmobilepaymentsdraftpc201311en.pdf
[17] ENISA,” Mobile Identity Management”, https://www.enisa.europa.eu/publications/Mobile%20IDM
[18] Drop Labs, “Rampant: Explaining the Current State of Apple Pay Fraud”, http://www.droplabs.co/?p=1231
[19] Apple, “About EMV and Apple Pay for Merchants”, https://support.apple.com/en-us/HT205645
[20] ISACA, ”2015 Mobile Payment Security Study”, https://www.isaca.org/Pages/mobile-payment-security-study.aspx
[21] Mobile Payment in Your Business", https://www.intelligenthq.com/resources/the-3-biggest-benefits-of-implementing-mobile-payment-in-your-business/
[22] Salvador Mendoza, “Samsung Pay: Tokenized Numbers, Flaws and Issues”, https://www.blackhat.com/docs/us-16/materials/us-16-Mendoza-Samsung-Pay-Tokenized-Numbers-Flaws-And-Issues-wp.pdf
[23] Zvelo, “Google Wallet Security: PIN Exposure Vulnerability”, https://zvelo.com/google-wallet-security-pin-exposure-vulnerability/
[24] Wonder How To, “ Apple Watch Vulnerability Lets Thieves Use Apple Pay Without Your PIN”, http://ios.wonderhowto.com/how-to/apple-watch-vulnerability-lets-thieves-use-apple-pay-without-your-pin-0161940/
[25] http://viaforensics.com/mobile-security/forensics-security-analysis-google-wallet.html
[26] MIT Technology Review, “Is Google Wallet Safe ?”, https://www.technologyreview.com/s/426921/is-google-wallet-safe/
[27] Choi, Daeseon, and Younho Lee. "Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay." In WOOT. 2016.
[28] Trend Micro Discovers MalumPoS; Malware Targeting Hotels and other US Industries http://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-discovers-malumpos-targets-hotels-and-other-us-industries/
[29] https://www.goodreturns.in/classroom/2016/11/types-mobile-wallets-their-difference-518655.html
[30] http://www.dqindia.com/top-6-mobile-wallets-in-india/2/
[31] http://www.iamwire.com/2016/11/list-of-mobile-wallets-upi-payment-apps-in-india/145172