Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as a mobile phone or Personal Digital Assistant (PDA). Mobile banking has until recently most often been performed via SMS or the Mobile Web. Apple's initial success with iPhone and the rapid growth of phones based on Google's Android (operating system) have led to increasing use of special client programs, called apps, downloaded to the mobile device hence increasing the number of banking applications that can be made available on mobile phones . This in turn has increased the popularity of mobile device use in regards to personal banking activities. Due to the characteristics of wireless medium, limited protection of the nodes, nature of connectivity and lack of centralized managing point, wireless networks tend to be highly vulnerable and more often than not they become subjects of attack. This paper proposes to identify potential threats associated with communication between a mobile device and the back end server in mobile banking applications. The paper should be able to identify the techniques associated with Man in the middle attacks during communication between a mobile device and a back end server and propose controls that will ensure that data theft does not occur during such sessions.
Authors and Affiliations
Anthony Luvanda1 , *Dr Stephen Kimani1 Dr Micheal Kimwele1
Segmentation of Tumor Region from Brain Mri Images Using Fuzzy C-Means Clustering And Seeded Region Growing
Abstract: The detection of brain tumor is one of the most challenging tasks in the field of medical image processing, since brain images are very complicated and tumors can be analyzed efficiently only by the expert radi...
Design and Analysis of 16 Bit Reversible ALU
Reversible or information-lossless circuits have applications in digital signal processing, communication, computer graphics and cryptography. Reversibility plays an important role when energy efficient computation...
Finding New Trends in Public Twitter Streams using Link Anomaly Detection
Abstract: Social Network is a site where individual’s vocation and share data identified with the present occasions everywhere throughout the world. This specific conduct of users made us concentrate on this rationale th...
Node Replication Attack Detection Algorithms in Wireless Sensor Networks: A Survey.
Abstract: The sensor networks are often deployed in hostile environments and are not attended for long time. Deployment of these networks is increased in the recent years, as they help in monitoring and analyzing d...
Audio Denoising, Recognition and Retrieval by Using Feature Vectors
In this paper, we present the study of audio signal denoising, recognizing its audio type and retrieving similar signals from the database. Primarily the signal is denoised to remove any noise present in the,unknown sign...