Vous êtes sur la page 1sur 3

Chapter 7

CONCLUSION

7.1 Conclusion

Security is a major issue in online payment system as there are various internet threats which affect
the security system of internet and increase risk. The current authentication technique for online
payment system is not very secure to protect user from identity theft, as a result any attacker gain
the access on confidential information of user like credit card number or account password and
make illegal transfer of fund. It is proved from our background study that single factor authen-
tication increases risks posed by phishing, identity theft, fraud and loss of customer confidential
information. Financial institution should implement an effective authentication to reduce fraud and
make strong customer authentication a necessary to enforce security to assist financial institutions
to detect and decrease user identity thefts.

The thesis is based on research work being done towards secured transaction for mobile payment
system which comes under the domain of mobile commerce. The different types of the payment
systems were discussed in the thesis for security analysis classified into 4 types Credit card based
systems, Electronic checks & Account Transfers, Electronic cash payment systems and Micropay-
ment systems.

159
Chapter 7. CONCLUSION 160

The introduction chapter discussed about the fundamentals of mobile commerce and its various
aspects with respect to process oriented architecture, encompasses issues in wireless network with
respect to mobile payment systems. The brief of the research work is furnished accompanied by
existing system. The chapter covered research motivation, methodology, aim and objectives. The
review of literature discussed about the prominent research work that was done for collecting all
the valuable data from the past research work. The third chapter illustrated security in mobile
commerce along with challenges in mobile payment systems. The fourth chapter introduced a
security model based on newly designed gaining protocol. The preliminary work resumed from
system highlighting one of the major businesses of financial institutions where the requirements
has been shown for need of cloud platform for deploying Infrastructure as a Service. The current
trend of trusted hand-held devices has enabled the banking customer to access their privilege right
in their palm. The work highlighted the feasibility of impending factors for acceptance of mobile
commerce application in cloud. Various issues found in the deployment of cloud services includes
application redesign & development, network condition & service availability, control of applica-
tion, privacy of personal data and information security.

The fifth chapter presented a novel approach of process oriented architecture for secure mobile
commerce framework using uniquely designed hybrid mobile adhoc routing protocols using reac-
tive and proactive type in real time test-bed. The research work discusses about deployment of
mobile commerce which is one of the emerging trend in mobile applications with huge demands.
Majority of the existing system lacks either QoS or efficient security protocol as it relates to se-
cure mobile transaction due to the reason that development in wireless technology involved in
m-commerce is still in its nascent stage. The real time test bed has been implemented with 20
Intel Atom processor with 32 bit OS establishing an adhoc network and by providing a random
mobility to achieve any file type transfer from node to node. For the real-time set up purpose, the
experiment was conducted in wireless infrastructure with mobility using G-based Linksys wireless
router. With iteration of experiments conducted showing a enocuraging results providing insights
with various parameters, security requirements and concepts which is required in creating a robust
model for secure m-commerce system. The sixth chapter presented a novel approach of design-
ing a highly secured and robust process oriented architecture for micropayment system in wireless
Chapter 7. CONCLUSION 161

adhoc network. Deployment of any confidential transaction over dynamic nature of wireless ad-
hoc network will strike a high amount of security challenges which is very difficult to identify
which poses a great difficulty in designing and effective countermeasures. The current work de-
signs the security process using hash chain and Simple Public Key Infrastructure implemented
on newly designed digital agreement of broker along with paving new secure routing for secure
m-transaction as an efficient alternative for digital coin. The system stimulates the intermediate
nodes to cooperate for facilitating secure and reliable transaction from source to destination nodes.
The system consists of high end encryption using hash function is also independent of any Trusted
Third Party as the network topology frequency changes, thereby it is flexible, lightweight and re-
liable for secure micropayment systems. The analysis result shows the system is highly robust
and secure ensuring anonymity, privacy and non-repudiation offline payment system over wireless
adhoc network.

7.2 Future Enhancement

Mobile commerce raises a number of security and privacy challenges by extending to analyze
the security requirements of mobile commerce; present a solution in which the mobile commerce
security is enhanced by using Wireless Public Key Infrastructure inspite of Simple Public key
Infrastructure. An WAP Identity Module or Wireless Identification Module Bluetooth earphone
with Embedded Secure Access Module is connected to the Smartphone by Bluetooth interface for
ensuring the end to end security ability between user and mobile commerce service providers and
storing private data, give the architecture of mobile commerce security system based on WPKI
with Bluetooth earphone, design the function of each roles in the system.

Vous aimerez peut-être aussi