Advertisement

A Study of Digital Banking: Security Issues and Challenges

  • B. VishnuvardhanEmail author
  • B. Manjula
  • R. Lakshman Naik
Conference paper
  • 20 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1090)

Abstract

In the extensive sense, mobile banking (M-Banking) is defined as the financial transaction execution through smart devices or electronic devices. The clients are utilizing mobile devices with the combination of mobile communication systems for purpose of electronic transactions (E-transactions). The major reason for the expansion of electronic banking (E-Banking) is due to continuous growth of Internet speed, facilities, personal Digital Assistants (PDAs), Internet-empowered phones, and designing of banking application. This made another new subset of E-Banking and M-Banking. We mainly concentrated on E-Banking and M-Banking aspects of banking area. In this paper, we examined the general structure of Indian banks and identified relevant digital banking types, which are classified into E-Banking and M-Banking. We carried a survey on modern M-Banking and determined five different categories of M-banking services and listed out the functionalities, advantages, disadvantages, and security issues of it. We also examine the security attacks on mobile devices and wireless networks. Finally, a related work is carried on the existing system based on the security concern issues in M-Banking.

Keywords

Authentication Banking Security Mobile Internet Attacks SMS IVRS GSM WAP 

References

  1. 1.
    Mega Merger of IDBI, IFCI and IIBI under Consideration. Financial Express. http://www.financialexpress.com/news/71999/1. Retrieved Mar 25, 2012.
  2. 2.
    Krishnan, Sankar. 2014. The Power and Potential of Mobile Banking. Wiley.Google Scholar
  3. 3.
    M2 Magazine. 2017. Global RFID Tags Market is Predicted to Grow at Approximately 7% by 2022, M2 Communications. Feb 7, 2017.Google Scholar
  4. 4.
    Hu, Xianling, and Jin Nie. 2008. Mobile Banking Information Security and Protection Methods. 03: 587–590.Google Scholar
  5. 5.
    Tiwari, Rajnish, Stephan Buse, and Cornelius Herstatt. 2006. Customer on the Move: Strategic Implication of Mobile Banking for Banks and Financial Enterprises. 81–81.  https://doi.org/10.1109/cec-eee.2006.30.
  6. 6.
    Key, Pousttchi, and Martin Schurig. 2004. Assessment of today’s mobile banking applications from the view of customer requirements. In 2004, Proceedings of the 37th , Annual Hawaii International Conference on System Sciences, Big Island, HI, 10, HICSS.2004.1265440.Google Scholar
  7. 7.
    SMS, WAP and USSD Information. www.ukessays.com & blog.aujasnetworks.com.
  8. 8.
    Soni, P. 2010. M-Payment Between Banks Using SMS. In Proceedings of the IEEE, 98: 903–905.Google Scholar
  9. 9.
    Harb, H., H. Farahat., and M. Ezz. 2008. Secure SMS Pay: Secure SMS Mobile Payment Model. In 2008 Second International Conference on Anti-Counterfeiting, Security and Identification, ASID, 11–17.Google Scholar
  10. 10.
    Rai, Nitika, and Anurag Ashok et.al. 2012. M-Wallet: An SMS Based Payment System. International Journal of Engineering Research and Applications (IJERA) 258–263. ISSN 2248-9622.Google Scholar
  11. 11.
    Desai, Suhas. 2011. Mitigating Security Risks In USSD-Based Mobile Payment Applications. An Aujas White Paper.Google Scholar
  12. 12.
    Sohail M. Sadiq, and Balachandran Shanmugham. 2003. E-Banking and Customer Preferences in Malaysia: An Empirical Investigation. Information Sciences 207–217. Elsevier.Google Scholar
  13. 13.
    Dass, Rajanish, and Rajarajan Muttukrishnan. 2011. Security Framework for Addressing the Issues of Trust on Mobile Financial Services. IEEE  https://doi.org/10.1109/nwesp.2011.6088160.
  14. 14.
    Nosrati, Leili, and Amir massoud Bidgoli. 2015. Security Assessment of Mobile-Banking. In IEMCON, IEEE. 7344489.Google Scholar
  15. 15.
    Kumar, Sumeet, Kathleen M. Carley. 2016. DDoS Cyber-Attacks Network: Who’s Attacking Whom. IEEE. 7745476.Google Scholar
  16. 16.
    He, Wu. 2012. A review of Social Media Security Risks and Mitigation Techniques. JSIT 14 (2): 171–180.CrossRefGoogle Scholar
  17. 17.
    Callegati, Franco, Walter Cerroni, and Marco Ramilli. 2009. Man-in-the-Middle Attack to the HTTP Protocol. IEEE Security & Privacy, IEEE 7: 78–81.  https://doi.org/10.1109/msp.2009.12.CrossRefGoogle Scholar
  18. 18.
    Sangjun, lee, SeungBae park. 2005. Mobile Password System for Enhancing Usability-Guaranteed Security in Mobile Banking 66–74, Berlin, Heideberg Springer.Google Scholar
  19. 19.
    Neeabh. 2012. Tracking Digital Footprints of Scare ware to Thwart Cyber Hypnotism Through Cyber Vigilantism in Cyberspace. BIJIT—BVICAM’s International Journal of Information Technology, BIJIT 4 (2).Google Scholar
  20. 20.
    La Polla, Mariantonietta, Fabio Martinelli, and Daniele Sgandurra. 2012. A Survey on Security for Mobile Devices. IEEE Communications Surveys and Tutorials 15 (1): 446–471.CrossRefGoogle Scholar
  21. 21.
    Zhao, Ting, Gang Zhang, and Lei Zhang. 2014. An Overview of Mobile Devices Security Issues and Countermeasures, ICWCSN. IEEE.Google Scholar
  22. 22.
    Barakovic, Sabina, Ena Kurtovic, Olja Bozanovic, Anes Jasmina, and Barakovic Husic. 2016. Security Issues in Wireless Networks: An Overview. In 2016 XI International Symposium on Telecommunications (BIHTEL), 1–6.Google Scholar
  23. 23.
    Akhil, Gupta, Rakesh Kumar Jha. 2015. A Survey of 5G Network: Architecture and Emerging Technologies. IEEE, 3: 1206–1232.Google Scholar
  24. 24.
    Bandela, Vishnuvardhan, B. Manjula. 2017. Mobile Communication: Implication Issues. International Journal of Computer Trends and Technology (IJCTT) 49(1):9–14. ISSN: 2231-2803. Published by Seventh Sense Research Group.Google Scholar
  25. 25.
    Rodriguez, Jonathan. 2015. Security for 5G Communications. In Fundamentals of 5G Mobile Networks, 207–220. London: Wiley.  https://doi.org/10.1002/9781118867464.ch9.
  26. 26.
    Khan, Hameed Ullah. 2014. E-Banking: Online Transactions and Security Measures. RJAS, E&T 7 (19): 4056–4063.CrossRefGoogle Scholar
  27. 27.
  28. 28.

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • B. Vishnuvardhan
    • 1
    Email author
  • B. Manjula
    • 1
  • R. Lakshman Naik
    • 2
  1. 1.Department of Computer ScienceKakatiya UniversityWarangalIndia
  2. 2.Department of ITKUCE & T, Kakatiya UniversityWarangalIndia

Personalised recommendations