Abstract
The conventional financial frameworks such as the exchanges over the bank counter with a passbook are upgraded by adding the components of electronic banking, all the bank exchanges/transaction are made possible over the Internet with the progression of data and the corresponding innovation. Nonetheless, there are significant risks associated with this innovation, such as banking fraud. Hence, to fabricate trust among banking clients, it is vital to build security systems. In electronic banking, security systems basically centre on demonstrating a solid framework for the web-based exchange, particularly client validation. Numerous experts have proposed various models for web-based client access validation in the financial industry. A large portion of the research depends on the conventional type of username and secret key, yet with the differing systems of secret key structures. For example, secret phrase in erratic worth, secret key in erratic worth via obtained channel, and biometric preferred finger impression acknowledgement, voice acknowledgement, or retina acknowledgement. This paper has examined the existing client access for Internet banking based on mobile phones. The elements of the SIM card and the attributes portable of the SIM card are portrayed. Cloning, a danger to the SIM card is additionally portrayed. Discoveries show that all the security models for online client access contain secret words such as worth, biometric, or PIN. In this manner, none of the current client accesses proposed the possibility of the client access in the light of the International Mobile Equipment Identity (IMEI) number to strengthen the security of the client access. The proposed research work is more focused on security the mobile payment by utilizing the IMEI.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hassan, M. A., & Shukur, Z. (2022). Device identity-based user authentication on electronic payment system for secure E-wallet apps. Electronics, 11, 4.
Hammood, W. A., Abdullah, R., Hammood, O. A., Asmara, S. M., Al-Sharafi, M. A., & Muttaleb Hasan, A. (2020). A review of user authentication model for online banking system based on mobile IMEI number. IOP Conference Series Materials Science and Engineering , 769.
Ghiduk, A. S. (2012). Design and implementation of the user interface and the application for mobile devices. International Journal of Computer Applications, ISSN 0975-8887.
Marcus, P., & Peitek, N. (2016). Retrofit love working with APIs on android future studio.
Dewi, P. (2010). Pemodelan process Bisnis Menggunakan Activity Diagram UML dan BPMN. Jurnal Fakultas Teknology Industri Universitas Kristen Petra Surabaya.
Ramos, M., & Tulio, M. (2018). Angular JS performance. IEEE Computer Society, ISSN 0740-7459.
Ruby, S., & Richarson, L. (2007). Restful web service.
Samisa. (2008). Restful, PHP, web service. Packet Publishing.
Sharfina, Z., & Santoso, B. (2016). An Indonesian adaptation of the system usability scale.
Fatonah, S., Yulandari, A., & Wibowo, P. W. (2018). A review of E-payment in E-commerce. Journal of Physics Conference Series.
Wirdasan, D. (2019). Teknology e-commerce Dalam process Bisnis. 7(2).
Alam, S. B., et al. (2010). A secured electronic transaction scheme for mobile banking in Bangladesh incorporating digital watermarking. In 2010 IEEE International Conference on Information Theory and Information Security.
Chowdhury, M. M., & Noll, J. (2007). Distributed identity for secure service interaction. In 2007 Third International Conference on Wireless and Mobile Communications (ICWMC’07).
Yin, X., et al. (2009). An improved dynamic identity authentication scheme based on PKI-SIM card.
Priya, R., Tamil Selvi, V., & Ramesh Kumar, G. (2014). A novel algorithm for secure internet banking with finger print recognition. Ä°n International Conference on Embedded Systems (ICES).
Basavala, S. R., Kumar, N., & Agarrwal, A. (2012). Authentication: An overview, its types and integration with web and mobile applications. In 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.
Hammood, O. A., Kahar, M. N. M., Mohammed, M. N., & Hammood, W. A. (2017). Issues and challenges of video dissemination in VANET and routing protocol: Review. Journal of Engineering and Applied Sciences, 12(11), 9266–9277.
Conklin, A., Dietrich, G., & Walz, D. (2004). Password-based authentication: A system perspective. In 37th Annual Hawaii International Conference on System Sciences.
Martino, A. S., & Perramon, X. (2008). A model for securing E-banking authentication process: Anti phishing approach. In IEEE Congress on Services-Part I.
Acknowledgements
Thanks to the Department of Computer Science and Engineering, Hindustan Institute of Technology and Science, Chennai, India.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kathiravan, M., Sambath, M., Bhuvaneshwari, B., Nithya Krishna, S., Jeshwin, W., Babu, N. (2023). Improved Security on Mobile Payments Using IMEI Verification. In: Shakya, S., Du, KL., Ntalianis, K. (eds) Sentiment Analysis and Deep Learning. Advances in Intelligent Systems and Computing, vol 1432. Springer, Singapore. https://doi.org/10.1007/978-981-19-5443-6_16
Download citation
DOI: https://doi.org/10.1007/978-981-19-5443-6_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-5442-9
Online ISBN: 978-981-19-5443-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)