Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as a mobile phone or Personal Digital Assistant (PDA). Mobile banking has until recently most often been performed via SMS or the Mobile Web. Apple's initial success with iPhone and the rapid growth of phones based on Google's Android (operating system) have led to increasing use of special client programs, called apps, downloaded to the mobile device hence increasing the number of banking applications that can be made available on mobile phones . This in turn has increased the popularity of mobile device use in regards to personal banking activities. Due to the characteristics of wireless medium, limited protection of the nodes, nature of connectivity and lack of centralized managing point, wireless networks tend to be highly vulnerable and more often than not they become subjects of attack. This paper proposes to identify potential threats associated with communication between a mobile device and the back end server in mobile banking applications. The paper should be able to identify the techniques associated with Man in the middle attacks during communication between a mobile device and a back end server and propose controls that will ensure that data theft does not occur during such sessions.

Authors and Affiliations

Anthony Luvanda1 , *Dr Stephen Kimani1 Dr Micheal Kimwele1

Keywords

Related Articles

 Schedulability Analysis for a Combination of Non-PreemptiveStrict Periodic Tasks and Preemptive Sporadic Tasks

 Abstract: We consider the problem of fixed priority scheduling of non-preemptive strict periodic tasks inconjunction with sporadic preemptive tasks. There are few studies about the scheduling problem combiningthese...

Detecting Malicious Nodes in Wireless Sensor Networks

Abstract:A typical wireless sensor network consists of several tiny and low-power sensors which use radio frequencies to perform distributed sensing tasks. Wireless sensor networks are used to detect the occurrence of ev...

 Design of ANN for prediction of operating performance Gas Sweetening Process used in Natural Gas Purification

 Abstract: Gas sweetening unit is an essential industrial processthat exhibits significant non-linear behavior. It comprises of absorption and regeneration towers.Conventional linear control schemes based on rigorou...

 Alternate Sort

 Sorting algorithms are the main concepts of the subject Data Structures and It’s Applications. These algorithms are designed in arranging the data elements in the sorted order. If the data elements are arranged...

 Semantic Web Data Mining & Analysis

Abstract: Semantic Web Mining combines two fast developing research areas: Semantic Web & Web Mining. In this relation, the research intension is to improve on the one hand, Web mining methods with new needs of seman...

Download PDF file
  • EP ID EP147390
  • DOI 10.9790/0661-16293542
  • Views 65
  • Downloads 0

How To Cite

Anthony Luvanda1, *Dr Stephen Kimani1 Dr Micheal Kimwele1 (2014).  Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 35-42. https://europub.co.uk/articles/-A-147390