Secure Mobile Payment (SMP): Challenges and Potential Solutions.

Authors

  • Shahad AL-Tamimi Department of Cybersecurity, King Hussein School of Computing Sciences, Prince Sumaya University for Technology, PO Box 1438, Amman 11941, Jordan
  • Qasem Abu Al-Haija Department of Cybersecurity, Faculty of Computer & Information Technology, Jordan University of Science and Technology, PO Box 3030, Irbid 22110, Jordan.

Keywords:

Mobile Payment (MP), Secure Mobile Payment (SMP), Online Payment, Mobile Devices, Financial Transaction, Electronic Transaction, Digital Payment Systems (DPS), Digital Environment, Near Field Communication (NFC)

Abstract

Mobile devices, in particular, have revolutionized how financial transactions are conducted, making secure mobile payment (SMP) a primary method for completing transactions. The intersection of finance and technology, facilitated by internet usage, has given rise to digital payment systems, which serve as the foundation for financial inclusion. However, the convenience of mobile payment also brings forth several security issues that need to be addressed. Near Field Communication (NFC) technology has significantly impacted consumers' lives by integrating with mobile payment systems. Consequently, NFC-enabled payment systems have recently emerged in the consumer market, attracting the interest of businesses seeking to invest in this technology. This study comprehensively examines the mobile payment security landscape, encompassing security challenges and proposed solutions. Through this review, we aim to contribute to understanding mobile payment security and foster advancements that ensure a secure and reliable payment ecosystem.

Downloads

Download data is not yet available.

References

V. Njebiu, M. Kimwele and R. Rimiru, "Secure Contactless Mobile Payment System," 2021 IEEE Latin-American Conference on Communications (LATINCOM), Santo Domingo, Dominican Republic, 2021, pp. 1-6, doi: 10.1109/LATINCOM53176.2021.9647831.

Alamleh, H., AlQahtani, A. A. S., & Smadi, B. A. (2023). Secure mobile payment architecture enabling multifactor authentication. Ithaca: Cornell University Library, arXiv.org. Retrieved from https://www.proquest.com/working-papers/secure-mobile-payment-architecture-enabling-multi/docview/2803674803/se-2.

M. Bosamia, "Mobile Wallet Payments Recent Potential Threats and Vulnerabilities with its Possible Security Measures," in International Conference on Soft Computing and its Engineering Applications (icSoftComp-2017), CHARUSAT, Changa, India, 2017.

Al-Haija, Q.A.; Alsulami, A.A. High Performance Classification Model to Identify Ransomware Payments for Heterogeneous Bitcoin Networks. Electronics 2021, 10, 2113. https://doi.org/10.3390/electronics10172113.

M. Al-Tamimi and A. Al-Haj, "Online security protocol for NFC mobile payment applications," 2017 8th International Conference on Information Technology (ICIT), Amman, Jordan, 2017, pp. 827-832, doi: 10.1109/ICITECH.2017.8079954.

Al-Haija QA, Alnabhan M, Saleh E, Al-Omari M. Applications of blockchain technology for improving security in the Internet of things (IoT). InBlockchain Technology Solutions for the Security of Iot-Based Healthcare Systems 2023 Jan 1 (pp. 199-221). Academic Press.

A. Badawi and Q. A. Al-Haija, "Detection of money laundering in bitcoin transactions," 4th Smart Cities Symposium (SCS 2021), Online Conference, Bahrain, 2021, pp. 458-464, doi: 10.1049/icp.2022.0387.

S. Saxena, S. Vyas, B. S. Kumar, and S. Gupta, "Survey on online electronic payments security," in Proc. Amity Int. Conf. Artif. Intell. (AICAI), Feb. 2019, pp. 751–756.

A. Brohi et al., "Near field communication enabled payment system adoption: A proposed framework," 2017 IEEE 3rd International Conference on Engineering Technologies and Social Sciences (ICETSS), Bangkok, Thailand, 2017, pp. 1-5, doi: 10.1109/ICETSS.2017.8324199.

Y. Wang, C. Hahn, and K. Sutrave, "Mobile payment security, threats, and challenges," 2016 Second International Conference on Mobile and Secure Services (MobiSecServ), Gainesville, FL, USA, 2016, pp. 1-5, doi: 10.1109/MOBISECSERV.2016.7440226.

K. Fan, H. Li, W. Jiang, C. Xiao, and Y. Yang, "Secure Authentication Protocol for Mobile Payment," in Tsinghua Science and Technology, vol. 23, no. 5, pp. 610-620, Oct. 2018, doi: 10.26599/TST.2018.9010031.

Ghosh, Shirsha & Majumder, Alak & Goswami, Joyeeta & Kumar, Abhishek & Mohanty, Saraju & Bhattacharyya, Bidyut. (2017). Swing-Pay: One Card Meets All User Payment and Identity Needs: A Digital Card Module using NFC and Biometric Authentication for Peer-to-Peer Payment. IEEE Consumer Electronics Magazine. 6. 82-93. 10.1109/MCE.2016.2614522.

M. Obaid, Z. Bayram, and M. Saleh, "Instant Secure Mobile Payment Scheme," in IEEE Access, vol. 7, pp. 55669-55678, 2019, doi 10.1109/ACCESS.2019.2913430.

G. Ali, M. A. Dida, and A. E. Sam, "Two-factor authentication scheme for mobile money: A review of threat models and countermeasures," Future Internet, vol. 12, no. 10, p. 160, Sep. 2020.

K. Albulayhi and Q. A. Al-Haija, "Early-stage Malware and Ransomware Forecasting in the Short-Term Future Using Regression-based Neural Network Technique," 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN), Al-Khobar, Saudi Arabia, 2022, pp. 735-742, doi: 10.1109/CICN56167.2022.10008270.

Q. A. Al-Haija, "Time-Series Analysis of Cryptocurrency Price: Bitcoin as a Case Study," 2022 International Conference on Electrical Engineering, Computer and Information Technology (ICEECIT), Jember, Indonesia, 2022, pp. 49-53, doi: 10.1109/ICEECIT55908.2022.10030536.

J. Sun and N. Zhang, "The mobile payment based on public-key security technology," J. Phys., Conf. Ser., vol. 1187, no. 5, Apr. 2019, Art. no. 052010.

Khando, K., Islam, M. S., & Gao, S. (2023). The emerging technologies of digital payments and associated challenges: A systematic literature review. Future Internet, 15(1), 21. Doi https://doi.org/10.3390/fi15010021.

Ketipov,R.,Angelova,V.,Doukovska,L. & Schnalle,R.(2023).Predicting User Behavior in e-Commerce Using Machine Learning. Cybernetics and Information Technologies,23(3) 89-101. https://doi.org/10.2478/cait-2023-0026.

Popchev I, Ketipov R, Angelova V. Risk averseness and emotional stability in e-commerce. Cybernetics and Information Technologies. 2021 Sep 1;21(3):73-84.

S. S. Ahamad, "A Novel NFC-Based Secure Protocol for Merchant Transactions," in IEEE Access, vol. 10, pp. 1905-1920, 2022, doi: 10.1109/ACCESS.2021.3139065.

Galhotra, A. Jatain, S. B. Bajaj and V. Jaglan, "Mobile Payments: Assessing the Threats, Challenges and Security Measures," 2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 2021, pp. 997-1004, doi: 10.1109/ICECA52323.2021.9676092.

Hassan, M. A., Shukur, Z., Mohammad, K. H., & Al-Khaleefa, A. (2020). A review on electronic payments security. Symmetry, 12(8), 1344. Doi https://doi.org/10.3390/sym12081344.

W. Liu, X. Wang, and W. Peng, "State of the Art: Secure Mobile Payment," in IEEE Access, vol. 8, pp. 13898-13914, 2020, doi: 10.1109/ACCESS.2019.2963480.

Turk, P. Angin and A. Cosar, "RONFC: A Novel Enabler-Independent NFC Protocol for Mobile Transactions," in IEEE Access, vol. 7, pp. 95327-95340, 2019, doi: 10.1109/ACCESS.2019.2929011.

A. Al-Haj and M. A. Al-Tameemi, "Providing security for NFC-based payment systems using a management authentication server," 2018 4th International Conference on Information Management (ICIM), Oxford, UK, 2018, pp. 184-187, doi: 10.1109/INFOMAN.2018.8392832.

Nsikan Nkordeh, Akindele Ayoola, Opeoluwa Bankole, Oloyede Oludotun, Ekwenem Nwabueze, and Okpor Paul Chidi, "Green Computing: Towards Sustainable 5G Network Deployment," Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering and Computer Science 2019, 22-24 October, 2019, San Francisco, USA, pp140-143.

Albert Kofi Kwansah Ansah, "Design and Implementation of a GSM Mobile Detector and Jammer," Lecture Notes in Engineering and Computer Science: Proceedings of The World Congress on Engineering and Computer Science 2018, 23-25 October 2018, San Francisco, USA, pp95-101.

Abu Al-Haija Q, Mohamed O, Abu Elhaija W. Predicting global energy demand for the next decade: A time-series model using nonlinear autoregressive neural networks. Energy Exploration & Exploitation. 2023;0(0). doi:10.1177/01445987231181919.

W. Ahmed et al., "Security in Next Generation Mobile Payments Systems: A Comprehensive Survey," in IEEE Access, vol. 9, pp. 115932-115950, 2021, doi: 10.1109/ACCESS.2021.3105450.

Qaqish E, Aranki A, Al-Haija QA, Qusef A. Security Comparison of Blockchain and Cloud-based Identity Management: Considering the Scalability Problem. In2023 International Conference on Inventive Computation Technologies (ICICT) 2023 Apr 26 (pp. 1078-1085). IEEE.

M. Wazid, S. Zeadally, and A. K. Das, "Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions," in IEEE Consumer Electronics Magazine, vol. 8, no. 2, pp. 56-60, March 2019.

Abu Al-Haija, Q., Al-Fayoumi, M. An intelligent identification and classification system for malicious uniform resource locators (URLs). Neural Comput & Applic (2023). https://doi.org/10.1007/s00521-023-08592-z.

Droos A, Al-Haija QA, Alnabhan M. Lightweight detection system for low-rate DDoS attack on software-defined-IoT. In6th Smart Cities Symposium (SCS 2022) 2022 Dec 6 (Vol. 2022, pp. 157-162). IET.

[35] Al-Haija QA. Cost-effective detection system of cross-site scripting attacks using a hybrid learning approach. Results in Engineering. 2023 Jun 27:101266.

Kang, J. (2018). Mobile payment in fintech environment: Trends, security challenges, and services. Human-Centric Computing and Information Sciences, 8(1), 1-16. Doi https://doi.org/10.1186/s13673-018-0155-4.

F. Altwairqi, M. A. AlZain, B. Soh, M. Masud, and J. Al-Amri, "Four most famous cyber-attacks for financial gains," Int. J. Eng. Adv. Technol. vol. 9, pp. 2131–2139, Dec. 2019.

A. Ortiz-Yepes, "A Review of Technical Approaches to Realizing Near-Field Communication Mobile Payments," in IEEE Security & Privacy, vol. 14, no. 4, pp. 54-62, July-Aug. 2016, doi: 10.1109/MSP.2016.75.

Nagre and A. Sen, "Study Of Security Postures In Payment Gateways Using a Case Study Approach," 2022 International Conference on Decision Aid Sciences and Applications (DASA), Chiangrai, Thailand, 2022, pp. 534-538, doi: 10.1109/DASA54658.2022.9765163.

Chen, "Discussion on the Security Mechanism of Mobile Payment," 2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC), Guiyang, China, 2021, pp. 65-68, doi: 10.1109/ICNISC54316.2021.00020.

Abu Al-Haija, Q.; Alsulami, A.A. Detection of Fake Replay Attack Signals on Remote Keyless Controlled Vehicles Using Pre-Trained Deep Neural Network. Electronics 2022, 11, 3376. https://doi.org/10.3390/electronics11203376

Puneet Kaur, Amandeep Dhir, Naveen Singh, Ganesh Sahu, Mohammad Almotairi, An innovation resistance theory perspective on mobile payment solutions, Journal of Retailing and Consumer Services, Volume 55,2020,102059, ISSN 0969-6989, https://doi.org/10.1016/j.jretconser.2020.102059.

R. Xu, "Security Enhancement for SMS Verification Code in Mobile Payment," 2022 11th International Conference of Information and Communication Technology (ICTech)), Wuhan, China, 2022, pp. 3-7, doi: 10.1109/ICTech55460.2022.00008.

Alamleh, Hosam & Alqahtani, Ali & Al Smadi, Baker. (2023). Secure Mobile Payment Architecture Enabling Multifactor Authentication.

Y. Madwanna, M. Khadse and B. R. Chandavarkar, "Security Issues of Unified Payments Interface and Challenges: Case Study," 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC), Jalandhar, India, 2021, pp. 150-154, doi: 10.1109/ICSCCC51823.2021.9478078.

Hong Chen, "Path Planning of Mobile Robot Using Hybrid Algorithm Based on GA-IACO," Engineering Letters, vol. 30, no.2, pp582-589, 2022.

Selvi Lukman, Yul Yunazwin Nazaruddin, Bo Ai, and Endra Joelianto, "The Optimal Design of 26 Ghz 5G-R Micro-strip MIMO Outdoor Antennas for Future Railway Mobile Communication System," Engineering Letters, vol. 30, no.4, pp1662-1668, 2022.

Yuhang Cao, Yanling Shang, Wendian Zhang, Jiacai Huang, and Fangzheng Gao, "Prescribed-Time Stabilization of Double Integrator Systems with Application to Wheeled Mobile Robot," IAENG International Journal of Applied Mathematics, vol. 53, no.1, pp108-112, 2023.

Yanling Shang, and Jiacai Huang, "Fixed-Time Stabilization of Spatial Constrained Wheeled Mobile Robot via Nonlinear Mapping," IAENG International Journal of Applied Mathematics, vol. 50, no.4, pp791-796, 2020. ‘

Srivastava V, Dwivedi VK, Singh AK. Cryptocurrency Price Prediction Using Enhanced PSO with Extreme Gradient Boosting Algorithm. Cybernetics and Information Technologies. 2023 Jun 1;23(2):170-87.

Alzoubi YI, Aljaafreh A. Blockchain-Fog Computing Integration Applications: A Systematic Review. Cybernetics and Information Technologies. 2023 Mar 1;23(1):3-7.

Downloads

Published

03.01.2024

How to Cite

AL-Tamimi , S. ., & Abu Al-Haija , Q. . (2024). Secure Mobile Payment (SMP): Challenges and Potential Solutions. International Journal of Intelligent Systems and Applications in Engineering, 12(11s), 103–120. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4425

Issue

Section

Research Article