Book Details

INERNET OF EVERYTHING: A SOLUTION TO MOBILE BANKING USING VOICE RECOGNITION

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC).

Download this PDF format

Abstract

The advancement in the banking transaction systems over the years has been enormous, and the needs for identifications of customer authentication, validation, and confirmation are of utmost priority and should be dealt with judiciously. Mobile banking has emerged as one of the main divisions in the digital world of financial transactions and consists of information inquiry, notifications and alerts, applications, and payment transfers. Mobile-based application is used for connecting customer handsets with bank servers for all such services in the banking industry. The current trend of Mobile banking has gone beyond the use of Time Password (OTP) applications used by banks. The problem with current banking applications is that they send data directly to customers in plain text form compromising with security recognized as OTP in most online transactions. An online banking customer logging in to the bank’s website with a username and password triggers a request to send an OTP to his or her registered mobile phone or the OTP may not be necessary after one or two transactions. There is every likely hold of Mobile phones been stealing, accessed by unauthorized persons, or hacked. Upon receipt of a text message with the OTP, the customer enters it with an additional field on the banking site’s login page to complete the login process since your details are already on your phone. It could have been fine if the mobile network can act immediately but blocking of network provider involves the presentation of the National Identification Number (NIN), which is a chain reaction. The purpose of this research work is to provide a cost-effective, secure, fast Mobile banking solution combining features of cryptography as well as behavioral pattern and Interactive Voice Response for final authentication and authorization of customer identification in all forms of financial transactions.

References

[1] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, “Mobile banking Services in bank area”, SICE Annual Conference 2007, Japan

[2] Martinez Borreguero, F. Javier and Chaparro Peláez, Julián,” Spanish Mobile Banking Services: An Adoption Study”, Proceedings of the International Conference on Mobile Business 2005.

[3] Mohammad Shirali-Shahreza,” Improving Mobile Banking Security Using Steganography “, International Conference On Information Technology 2016.

[4] Przemyslaw Krol, Przemys?aw Nowak, Bartosz Sakowicz,”Mobile Banking Services Based On J2ME/J2EE”, CADSM’2007.

[5] Yousuf S. AlHinai, Sherah Kurnia, and Robert B. Johnston,” Adoption of Mobile, Commerce Services by Individuals: A Meta-Analysis of the Literature”, Sixth International Conference on the Management of Mobile Business.

[6] T N T Nguyen, P Shum, and E H Chua,” Secure end-to-end mobile payment System”.

[7] Ashutosh Saxena, Manik Lal Das, and Anurag Gupta,” MMPS: A Versatile Mobile-to-Mobile Payment System”, Proceedings of the International Conference On Mobile Business 2005.

[8] Iron-Chang Lin and Yang-Bin Lin,” An Efficient Steganography Scheme for M-Commerce”.

[9] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, ”Text Steganography in SMS”, 2007 International Conference on Convergence Information Technology.

[10] Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, ”Secure Display and Secure Transactions Using a Handset”, Sixth International Conference on the Management of Mobile Business.

[11] Jiehua Wang, Song Yuan, “A Novel Security Mobile Payment System Based On Watermarked Voice Cheque”.

[12] M. Shirali-Shahreza, "Stealth Steganography in SMS", Proceedings of the Third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006.

[13] Kevin Chikomo, Ming Ki Chong, Alpin Arnab, Andrew Hutchison, “Security of Mobile Banking”.

[14] Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud,” Evaluating the effects of Symmetric
Cryptographic algorithms on Power Consumption for different data types”, International Journal of Network Security, Volume 11, September 2010.

[15] Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, Jamalpur Snehal,” Implementation of LSB Steganography and its Evaluation for various bits”.

Keywords

Mobile Banking, Online Transactions, Cryptography, OTP.

Image
  • Format Volume 10, Issue 2, No 2, 2022.
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author Ebole Alpha Friday, Shomope Adewale Abduirasaq, Amusu Mary
  • Reference IJCS-429
  • Page No 2867-2874

Copyright 2024 SK Research Group of Companies. All Rights Reserved.