81
views
0
recommends
+1 Recommend
1 collections
    1
    shares
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Comparative Study of Network Securities
      on Mobile Transaction

      Preprint
      In review
      research-article
      Bookmark

            Abstract

            In recent years, the number of mobile transactions has skyrocketed. Because mobile payments are made on the fly, many consumers prefer the method to the traditional local payment approach.

            The rise in mobile payments has inspired this study into the security of mobile networks in order to instill trust in those who may be involved in the transaction in some way.

            This report is a precursor to explain and compare some of the most popular wireless networks that enable mobile payments, from a security standpoint, this research presents, explains, and compares some of the most common wireless networks that enable mobile payments. Threat models in 3G with connections to GSM, WLAN, and 4G networks are classified into four categories: attacks on privacy, attacks on integrity, attacks on availability, and assaults on authentication. In addition, we offer classification countermeasures which are divided into three categories: cryptographic methods, human factors, and intrusion detection methods. One of the most important aspects we analyze is the security procedures that each network employs. Since the security of these networks is paramount, it gives hope to subscribers. In summary, the study aims to verify if mobile payments offer acceptable security to the average user.

            Content

            Author and article information

            Journal
            ScienceOpen Preprints
            ScienceOpen
            2 November 2021
            Affiliations
            [1 ] Electrical and Computer Engineering/ Ahmadu Bello University , Samaru, Zaria, Kaduna, Nigeria
            [2 ] Mathematics/Computer Science, Federal University of Agriculture Makurdi, Makurdi, Benue, State, Nigeria.
            Author notes
            Article
            10.14293/S2199-1006.1.SOR-.PPZM9FW.v1
            be6d28ad-1055-4b61-a38c-02ccf92ba86d

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            Funding
            self self

            Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
            Computer science,Engineering,Physics
            Mobile ,,Transaction,Security,WLAN Security,Encryption,Security Protocol,Cipher Block,4G/LTE,LTE end-to-end Security,Wireless Security

            Comments

            Comment on this article