Security in Next Generation Mobile Payment Systems: A Comprehensive
Survey
- URL: http://arxiv.org/abs/2105.12097v1
- Date: Tue, 25 May 2021 17:34:22 GMT
- Title: Security in Next Generation Mobile Payment Systems: A Comprehensive
Survey
- Authors: Waqas Ahmed, Amir Rasool, Jamel Nebhen, Neeraj Kumar, Faisal Shahzad,
Abdul RehmanJaved, Thippa Reddy Gadekallu, Zunera Jalil
- Abstract summary: Cash payment is still king in several markets, accounting for more than 90 of the payments in almost all the developing countries.
Mobile phones have become an inseparable friend for many users, serving much more than just communication tools.
With the rise and advancements of mobile-specific security, threats are evolving as well.
- Score: 5.763861732641583
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cash payment is still king in several markets, accounting for more than 90\
of the payments in almost all the developing countries. The usage of mobile
phones is pretty ordinary in this present era. Mobile phones have become an
inseparable friend for many users, serving much more than just communication
tools. Every subsequent person is heavily relying on them due to multifaceted
usage and affordability. Every person wants to manage his/her daily
transactions and related issues by using his/her mobile phone. With the rise
and advancements of mobile-specific security, threats are evolving as well. In
this paper, we provide a survey of various security models for mobile phones.
We explore multiple proposed models of the mobile payment system (MPS), their
technologies and comparisons, payment methods, different security mechanisms
involved in MPS, and provide analysis of the encryption technologies,
authentication methods, and firewall in MPS. We also present current challenges
and future directions of mobile phone security.
Related papers
- How Do Mobile Applications Enhance Security? An Exploratory Analysis of Use Cases and Provided Information [0.18749305679160366]
More and more mobile applications have appeared on the market that address the aforementioned security issues.
Both academia and industry currently lack a comprehensive overview of these mobile security applications for Android and iOS platforms.
To address this gap, we systematically collected a total of 410 mobile applications from both the App and Play Store.
Then, we identified the 20 most widely utilized mobile security applications on both platforms that were analyzed and classified.
arXiv Detail & Related papers (2025-04-19T23:23:57Z) - Deep Learning Approaches for Anti-Money Laundering on Mobile Transactions: Review, Framework, and Directions [51.43521977132062]
Money laundering is a financial crime that obscures the origin of illicit funds.
The proliferation of mobile payment platforms and smart IoT devices has significantly complicated anti-money laundering investigations.
This paper conducts a comprehensive review of deep learning solutions and the challenges associated with their use in AML.
arXiv Detail & Related papers (2025-03-13T05:19:44Z) - Mobile Application Threats and Security [0.17249361224827534]
This manuscript will focus on security vulnerabilities in the mobile computing industry, especially focusing on tablets and smart phones.
The purpose of this study is to analyze current security risks and threats, and provide solutions that may be deployed to protect against such threats.
arXiv Detail & Related papers (2025-02-08T20:33:57Z) - Fundamental Risks in the Current Deployment of General-Purpose AI Models: What Have We (Not) Learnt From Cybersecurity? [60.629883024152576]
Large Language Models (LLMs) have seen rapid deployment in a wide range of use cases.
OpenAIs Altera are just a few examples of increased autonomy, data access, and execution capabilities.
These methods come with a range of cybersecurity challenges.
arXiv Detail & Related papers (2024-12-19T14:44:41Z) - Jailbreak Attacks and Defenses against Multimodal Generative Models: A Survey [50.031628043029244]
Multimodal generative models are susceptible to jailbreak attacks, which can bypass built-in safety mechanisms and induce the production of potentially harmful content.
This survey reviews jailbreak and defense in multimodal generative models.
arXiv Detail & Related papers (2024-11-14T07:51:51Z) - Foundations and Recent Trends in Multimodal Mobile Agents: A Survey [57.677161006710065]
Mobile agents are essential for automating tasks in complex and dynamic mobile environments.
Recent advancements enhance real-time adaptability and multimodal interaction.
We categorize these advancements into two main approaches: prompt-based methods and training-based methods.
arXiv Detail & Related papers (2024-11-04T11:50:58Z) - Architectural Design for Secure Smart Contract Development [0.0]
Several attacks on blockchain infrastructures have resulted in hundreds of millions of dollars lost and sensitive information compromised.
I identify common software vulnerabilities and attacks on blockchain infrastructures.
I propose a model for ensuring a stronger security standard for future systems leveraging smart contracts.
arXiv Detail & Related papers (2024-01-03T18:59:17Z) - Surveillance Face Presentation Attack Detection Challenge [68.06719263243806]
Face Anti-spoofing (FAS) is essential to secure face recognition systems from various physical attacks.
We collect a large-scale Surveillance High-Fidelity Mask (SuHiFiMask)
SuHiFiMask contains $10,195$ videos from $101$ subjects of different age groups, which are collected by $7$ mainstream surveillance cameras.
We organize a face presentation attack detection challenge in surveillance scenarios.
arXiv Detail & Related papers (2023-04-15T15:23:19Z) - Mobile Security for the modern CEO: Attacks, Mitigations, and Future
Trends [0.0]
Attacks on mobile devices grow yearly in volume and magnitude causing severe damage.
This paper offers a comprehensive overview of modern mobile attacks categorized into malware, phishing, communication, supply chain, physical, and authentication attacks.
It also provides security design tips to secure the mobile setup and general recommendations to prevent the successful execution of an incoming attack.
arXiv Detail & Related papers (2022-07-17T08:19:24Z) - Brief View and Analysis to Latest Android Security Issues and Approaches [0.0]
We conduct a wide range of analysis, including latest malwares, Android security features, and approaches.
We also provide some finding when we are gathering information and carrying on experiments.
arXiv Detail & Related papers (2021-09-02T09:34:11Z) - Factors that Determine Continuous Intention to Use Mobile Payments in
Malawi [0.0]
The proliferation of mobile phones has made mobile payments to be widely used in developing economies.
Mobile payment in Malawi is low, and there are many limitations to encourage users to continuously use mobile payments.
arXiv Detail & Related papers (2021-08-23T05:34:11Z) - Data Security on Mobile Devices: Current State of the Art, Open
Problems, and Proposed Solutions [4.1359299555083595]
We present definitive evidence, analysis, and (where needed) speculation to answer the questions.
We examine the two major platforms in the mobile space, iOS and Android.
We make recommendations for improving data security on these devices.
arXiv Detail & Related papers (2021-05-26T15:08:42Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Urban Sensing based on Mobile Phone Data: Approaches, Applications and
Challenges [67.71975391801257]
Much concern in mobile data analysis is related to human beings and their behaviours.
This work aims to review the methods and techniques that have been implemented to discover knowledge from mobile phone data.
arXiv Detail & Related papers (2020-08-29T15:14:03Z) - OpenBot: Turning Smartphones into Robots [95.94432031144716]
Current robots are either expensive or make significant compromises on sensory richness, computational power, and communication capabilities.
We propose to leverage smartphones to equip robots with extensive sensor suites, powerful computational abilities, state-of-the-art communication channels, and access to a thriving software ecosystem.
We design a small electric vehicle that costs $50 and serves as a robot body for standard Android smartphones.
arXiv Detail & Related papers (2020-08-24T18:04:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.