2009 International Conference on Ultra Modern Telecommunications &Amp; Workshops 2009
DOI: 10.1109/icumt.2009.5345473
|View full text |Cite
|
Sign up to set email alerts
|

Secure and cost effective transaction model for financial services

Abstract: With the advent of the e-commerce, it has become much easier for a 'data bandit' to sit in non descriptive location and quietly siphon away money from the service users. The financial service outlets (e.g. automated teller machine (ATM), point of sale (PoS) terminal) have been a soft target for these bandits since long. In the existing model, the users are forced to trust a service outlet to be authentic. A spoofed outlet can collect the account information and use it in some way later. Installing an outlet is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0
1

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 11 publications
0
12
0
1
Order By: Relevance
“…One of the most important challenges is the lack of reliable connectivity so that the transactions with the users' cards can be performed in real-time. In [277], a solution is proposed to this problem by using public key infrastructure (PKI). Private keys are stored in the card and the rural ATM, and the public keys issued by a trusted authority (e.g., Central Bank of a given country) can be exchanged between the two entities.…”
Section: ) Financial Servicesmentioning
confidence: 99%
See 2 more Smart Citations
“…One of the most important challenges is the lack of reliable connectivity so that the transactions with the users' cards can be performed in real-time. In [277], a solution is proposed to this problem by using public key infrastructure (PKI). Private keys are stored in the card and the rural ATM, and the public keys issued by a trusted authority (e.g., Central Bank of a given country) can be exchanged between the two entities.…”
Section: ) Financial Servicesmentioning
confidence: 99%
“…This way, authentication, encryption (for confidentiality), and integrity can be performed locally without the need to have a connection. Enhanced security can be achieved by using a mobile phone along with the smart card according to the approach described in [277]. However, certain issues remain to be addressed, the most important one being the risk of overdrawing from a certain bank account (since the ATM does not have a permanent connection).…”
Section: ) Financial Servicesmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the common authentication scheme used in financial services or transactions is using a hardware token like smartcards, credit/debit cards etc., but using these cards to authenticate the user identity is also not very sure in providing the security to the transactions. They are vulnerable to some frauds like swindlers (attackers) make use of skimmers that are devices used to capture data from the magnetic stripe of the card issued by the bank or any financial institution [11]. Multi layering of multi factor authentication is also important in hardening the security of financial services [12].…”
Section: Introductionmentioning
confidence: 99%
“…Since the model implies that some of the features of bank's server are accessed from outside the 'orthodox' bank network more security measures at different layers have to be applied. We propose the implementation of 'Low Cost secure transaction model' introduced by Munjal et al (2009) [8].…”
Section: Securitymentioning
confidence: 99%