Skip to main content

2017 | OriginalPaper | Buchkapitel

Security Protocol of Social Payment Apps

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Social Payment Apps have now become an integral part of individual’s life and business operations because of its reliability, easiness, and pace of transferring money. However, with the development of new technology, the security related issues have also increased drastically. In this research, many problematic issues have been observed in various apps that are in use these days. Both technical and social vulnerabilities were observed, that would allow an adversary to steal individual’s credential information or leak it. Moreover, a usable and secure payment guidelines and steps will be provided to make a better payment application which will gain users’ trust and e-commerce business. To measure the performance of the used payment app, one needs to dive off the boat in order to understand the flaws. Venmo, Google Wallet, and Apple Pay are the key apps that are analyzed and risks are observed in relation to social engineering. Moreover, a secure payment protocol using one-time password tokenization method is proposed that will keep transactions more secure. This research enlightens the security challenges and possible mitigations to prevent data breaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Mobile Payments: Risk, Security and Assurance Issues. ISACA, Meadows (2011) Mobile Payments: Risk, Security and Assurance Issues. ISACA, Meadows (2011)
4.
Zurück zum Zitat Pegueros, V.: Security of Mobile Banking and Payments. SANS (2012) Pegueros, V.: Security of Mobile Banking and Payments. SANS (2012)
5.
Zurück zum Zitat Kraft, B., Mannes, E., Moldow, J.: Security Research of a Social Payment App (2014) Kraft, B., Mannes, E., Moldow, J.: Security Research of a Social Payment App (2014)
6.
Zurück zum Zitat Khandekar, S., Liang, J., Razaque, A., Amsaad, F., Abdulgader, M.: Security research of a social payment app and suggested improvement. Commun. Appl. Electron. 4, 14–21 (2016)CrossRef Khandekar, S., Liang, J., Razaque, A., Amsaad, F., Abdulgader, M.: Security research of a social payment app and suggested improvement. Commun. Appl. Electron. 4, 14–21 (2016)CrossRef
7.
Zurück zum Zitat Park, A.S.: A security analysis on apple pay. In: European Intelligence and Security Informatics Conference, pp. 160–163, New York (2016) Park, A.S.: A security analysis on apple pay. In: European Intelligence and Security Informatics Conference, pp. 160–163, New York (2016)
8.
Zurück zum Zitat Margraf, M., Lange, S., Otterbien, F.: Security evaluation of apple pay at point-of-sale terminals. IEEE (2016) Margraf, M., Lange, S., Otterbien, F.: Security evaluation of apple pay at point-of-sale terminals. IEEE (2016)
17.
Zurück zum Zitat Williams, B.R.: How tokenization and encryption can enable PCI DSS compliance. Inf. Secur. Tech. Rep. 15, 160–165 (2010)CrossRef Williams, B.R.: How tokenization and encryption can enable PCI DSS compliance. Inf. Secur. Tech. Rep. 15, 160–165 (2010)CrossRef
18.
Zurück zum Zitat Technologies, E.: PCI Mobile Payment Acceptance Security Guidelines for Developers (2012) Technologies, E.: PCI Mobile Payment Acceptance Security Guidelines for Developers (2012)
24.
Zurück zum Zitat Li, W., Wen, Q., Su, Q., Jin, Z.: An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput. Commun. 35, 188–195 (2012)CrossRef Li, W., Wen, Q., Su, Q., Jin, Z.: An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput. Commun. 35, 188–195 (2012)CrossRef
Metadaten
Titel
Security Protocol of Social Payment Apps
verfasst von
Jasmeen Saini
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-69155-8_10