Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882

Volume 3, Issue 4, July 2014

MOBILE COMMERCE AND SECURITY ISSUES


Usman Jibril Wushishi1, Akintoye Oluwasegun Ogundiya2
1

(Department of Management Information Systems, Cyprus International University


Lefkosa, North Cyprus)
2
(Department of Management Information Systems, Cyprus International University
Lefkosa, North Cyprus)

ABSTRACT
Mobile commerce system in the environment has
grown tremendously over the years, the delivery of the
potentials of e-commerce into the hands of consumers
at any moment irrespective of time and location via
wireless technology even though it is yet to be
perfected. There are some challenges available to this
system in terms of mobile transaction and quality of
service (QoS).The m-commerce has not facilitated
satisfactory result even after deploying the
cryptographic protocols and other protocols regarding
security, in this paper we will discuss mobile
commerce entirely, the ongoing issues and challenges
in regards to mobile commerce, and some solutions to
these problems.
Keywords- Adhoc wireless network, m-commerce,
mobile device, online transaction, security and privacy

I.

INTRODUCTION

The emergence of various technologies and


applications hasbeen in cognizance over the years,
which are directed at mobile computing and the web.
Mobile commerce is known to be an important
functionality of the electronic commerce if not the
most important type of electronic commerce. This
form of commerce is majorly transaction activities
being carried out over these new technologies as well
as applications.
E-commerce has enhanced the focus on security both
for systems and also for messaging and transactions
[1].Recent advancement in handheld personal assistant
(PDAs), wireless communication technology and
pervasive infrastructure oath to extend comfort in the
environment for mobile users-commerce transactions
can be performed over adhoc wireless networks or
adhoc m-commerce which can be considered as
wireless trading outside established computer
networks[2].
M-commerce has made life much easier for many
people around the globe such that daily transactions
are being carried out wirelessly which is more
convenient but with that it poses some security threats.
M-commerce = e-commerce + wireless web [3].

II. MOBILE COMMERCE SYSTEM


Mobile commerce, is defined to be the delivery of ecommerce competence directly into the customers
hand, wherever through wireless technology was
initially coined by Kevin Duffey in 1997. The adhoc
mobile commerce takes place between multiple
numbers of nodes which are proximity of each other
without relying on the services of any infrastructure
[2].
A.
Properties of Mobile Commerce
1. Independent service provider The adhoc wireless
network are self-organized, that is they do not have a
network service infrastructure, a devoted service
provider wont be consigned for allocating
maintenance task to enable security parameter or
payment scheme for m-commerce applications.
2. Restricted scope of communication Different
communication restrictions especially the IEEE 802.11
are great challenges in adhoc networks by rendering
less security on third party services due to the dynamic
network topology.
3. Impulsive choice in adhoc configuration Equipped
clients with mobile devices automatically engage in mcommerce when on the mobile mode as the adhoc
wireless network possesses a self-organizing
characteristic.
4. Cost effectiveness Peer nodes frame the network,
hence no additional complex device in the mcommerce application to perform security operations.
5. Privacy No third party is required in achieving a
network communication which is very suitable for the
maintenance of the privacy protocol in commercial
transactions.
A.
Applications of m-commerce
There are numerous variety of m-commerce that can
be conducted over adhoc wireless networks.
1. Digital resource quality-Exchange of digital
contents such as music, videos, images, eBooks,
etc.
2. Auction in M-commerce-An auction process[2]
can be performed anywhere as long as a group of
at least 3 peer nodes with mobile devices and

www.ijsret.org

739

International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3, Issue 4, July 2014

shared software are in mutual agreement to


participate in the process, multicasting among
participant can distribute bids information about
what information related to an offer[2].
3. Machine enabled transaction-Various online
transactions which use mobile devices that are
already equipped with electronic cash in order to
make compensation at a point of sale (POS) and so
on via IEEE802.11 technology [2].
4. Mobile Banking-Most of the banks in existence
nowadays offer online banking through the aid of
mobile software where an entity could easily have
access to his account and engage in any form of
credit or debit transactions.
5. Amusement products-With the increase of
interactive gaming products peer tend to play
games or place a bet remotely without being
present at the centres so as casinos.

III. SECURITY THREATS ARISING FROM


M-COMMERCE
Mobile commerce operated on a radio frequency
platform is prone to passive attacks e.g. (snooping i.e.
eavesdropping on a network) or listening to ongoing
conversation [5].Consumers have great concerns
about the information they share amongst
participating parties either data or voice messages or
both from unauthorised party gaining access. On the
other hand, identification integrity and message
integrity are also involved in mobile security.
Unfortunately,the current platform in which mobile
communication is built on does not offer full scale
security measures when it comes to transaction
integrity [5].
The mobile adhoc wireless networks have some
limitations in particular which needed to be taken into
consideration. These issues are discussed briefly
below.
1. Transaction Management-The in-depth idea of
transaction can be difficult to enforce and network
intermitted disconnections will affect a particular
service in a secure m-commerce operations,
succession to fail accordingly the secure connectivity
would be considered unfinished and will be subjected
to abort [2].

2. Delivery of Service-Due to unique characteristics


of complexities of adhoc wireless network, existing
service discovery and delivery protocols do not seem
to suit the needs of an adhoc network making them
unsuitable for m-commerce oriented scenarios.
Service advertisements and deliveries may need to be
disseminated by a mix of a store and forward strategy
as well as local multicasting to cope with intermittent
online connectivity [2].
3. Trust system-One of the important factor of online
communication in terms of security is trust, it assists
the participating entries to ensure secure transaction
by reducing the chances of risk involved in
transactions. On the other hand, as the mobile
network cannot rely solely on network service
providers to facilitate security services such as
Certification Authority (CA).
In order to facilitate self-reliance to trading entities to
participate in secure m-commerce operation, the
following services should be considered.
1. Authentication- This is the first step which
facilitate both participating entities ensuring no any
illegal third party masquerading as a legitimate party
in other words the process of determining if someone
is indeed who he/she declares to be [6].
2. Confidentiality-This guarantees that secure
transaction information sent across the network is not
accessible by any unauthorised third party such as
snoopers [4].
3. Integrity-This ensures the message transmitted is
not being tampered with and it will arrive at the
intended recipient as genuine and un-tampered [4].
4. Non-Repudiation-This property assures that if the
sending entity sends a message the receivingentity,
both of the parties will not be able to claim with
disapproval or reject one was responsible for the
message.
5 Attestation-This enables an adhoc m-commerce
peer to vouch for the identity trading history or
transaction reputation of other peer nodes. It assists
alleviate threat in transacting with formerly unknown
entities[3].

www.ijsret.org

740

International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882
Volume 3, Issue 4, July 2014

IV. SOLUTIONS ON HOW TO SOLVE


MAIN CHALLENGES OF M-COMMERCE
Being one of the most constantly changing sectors in
the global economy, mobile payments has different
technologies and business models aiming diverse
markets based on how mobile users choose to
transact. Consumers payment options widens for
both virtual and actual goods as a result of new
mobile payment networks emergence. Even though
the challenges of high deployment costs, consumer
confusion and increased merchant competition, a
genuine end-to-end m-payment solution which
tradesfolk can be used in driving consumer behavior
and more revenues is a paramount market need.

V. CONCLUSION
As mobile commerce is an emerging market, there are
substantial opportunities and weighty risks. The
changing market requires innovative and diversified
environment for stakeholders. This article has
highlighted that executing mobile commerce is more
tasking than wireless commerce within provider
networks. For secure, reliable, better quality efficient
m-commerce system, this article has stressed out
some essential points to act as directives for better
understanding.

REFERENCES
[1] Suresh Chari, ParvizKermani, Sean Smith, and
LeandrosTassiulas Security Issues in MCommerce: A Usage-Based Taxonomy.
[2] ChitraKiran N, G. Narendra Kumar (World
Journal of Science and Technology, 2011)
Security Insights on M-commerce in adhoc
Wireless Network.
[3]Ravi Tandon, SwarupMandal, and DebashisSaha
M-Commerce Issues and Challenges.
[4]
AshishWadhaval,
Rugved
Mehta,
AshleshaGawade] (International Journal of
Engineering Trends and Technology (IJETT) Volume4Issue4 April 2013
ISSN: 2231-5381 http://www.ijettjournal.org Page
668) Mobile Commerce and Related Mobile
Security Issues.
[5] Raj Gururajan (INFORMATION & SECURITY.
An International Journal, Vol. 8, No. 1, 2002, 7186) New Financial Transaction Security
Concerns in Mobile Commerce.
[6] SEI Digital Library [CNSS 2010] Authentication,
resources.sei.cmu.edu/asset_files/.../2014_011_00
1_81821.pdf

www.ijsret.org

741

You might also like