Skip to main content

A Layered Approach to Fraud Analytics for NFC-Enabled Mobile Payment System

Part of the Lecture Notes in Computer Science book series (LNISA,volume 10722)

Abstract

Near Field Communication is the technology that will remain widespread in continual with the growth of smart phone influx [1, 10, 12, 15]. Moreover, people use smart phone’s to imperforate their mobile banking activities which in turn results in fraudulent activities. The fast growing use of electronic payments has increased the demand for emphatic, decisive and real time based method for fraud detection and prevention. To prevent fraudulent transaction a layered approach for NFC-enabled mobile payment system is proposed. The layered approach for fraud analytic will provide a solution based on transaction risk-modeling, business rule-based, and cross-field referencing.

Keywords

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
EUR   29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR   42.79
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR   52.74
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bangdao, C., Roscoe, A.W.: Mobile electronic identity: securing payment on mobile phones. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 22–37. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21040-2_2

    Chapter  Google Scholar 

  2. Lima, R.F., Pereira, A.C.M.: A fraud detection model based on feature selection and undersampling applied to web payment systems. In: 2015 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), Singapore, 6–9 December 2015, pp. 219–222 (2015)

    Google Scholar 

  3. Almuairf, S., Veeraraghavan, P., Chilamkurti, N., Park, D.-S.: Anonymous proximity mobile payment (APMP). Peer-to-Peer Netw. Appl. 7(4), 620–627 (2014)

    Article  Google Scholar 

  4. Demiriz, A., Ekizoğlu, B.: Using location aware business rules for preventing retail banking frauds. In: 2015 First International Conference on Anti-Cybercrime (ICACC), Riyadh, Saudi Arabia, 10–12 November 2015, pp. 1–6 (2015)

    Google Scholar 

  5. Wei, W., Li, J., Cao, L., Yuming, O., Chen, J.: Effective detection of sophisticated online banking fraud on extremely imbalanced data. World Wide Web 16(4), 449–475 (2013)

    Article  Google Scholar 

  6. Dal Pozzolo, A., Caelen, O., Le Borgne, Y.-A., Waterschoot, S., Bontempi, G.: Learned lessons in credit card fraud detection from a practitioner perspective. Expert Syst. Appl. 41(10), 4915–4928 (2014)

    Article  Google Scholar 

  7. Mehrnezhad, M., Hao, F., Shahandashti, S.F.: Tap-Tap and Pay (TTP): preventing the mafia attack in NFC payment. In: Chen, L., Matsuo, S. (eds.) SSR 2015. LNCS, vol. 9497, pp. 21–39. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27152-1_2

    Chapter  Google Scholar 

  8. Preuveneers, D., Goosens, B., Joosen, W.: Enhanced fraud detection as a service supporting merchant-specific runtime customization. In: Proceedings of the Symposium on Applied Computing, Marrakech, Morocco, 03–07 April 2017, pp. 72–76. ACM (2017)

    Google Scholar 

  9. Vishwakarma, P., Tripathy, A.K., Vemuru, S.: A hybrid security framework for near field communication driven mobile payment model. Int. J. Comput. Sci. Inf. Secur. 14(12), 337–348 (2016)

    Google Scholar 

  10. Coskun, V., Ozdenizci, B., Ok, K.: A survey on near field communication (NFC) technology. Wirel. Pers. Commun. 71(3), 2259–2294 (2013)

    Article  Google Scholar 

  11. Wang, Y., Hahn, C., Sutrave, K.: Mobile payment security, threats, and challenges. In: 2016 Second International Conference on Mobile and Secure Services (MobiSecServ), Gainesville, FL, USA, 26–27 February 2016, pp. 1–5 (2016)

    Google Scholar 

  12. Cai, C., Weng, J., Liu, J.: Mobile authentication system based on national regulation and NFC technology. In: 2016 IEEE First International Conference on Data Science in Cyberspace (DSC), Changsha, 2016, pp. 590–595 (2016)

    Google Scholar 

  13. Van Damme, G., Wouters, K.M., Karahan, H., Preneel, B.: Offline NFC payments with electronic vouchers. In: MobiHeld 2009, Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds, Barcelona, Spain, 17 August 2009, pp. 25–30 (2009)

    Google Scholar 

  14. Edge, M.E., Sampaio, P.R.F., Choudhary, M.: Towards a proactive fraud management framework for financial data streams. In: Third IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 2007), Columbia, MD, pp. 55–64 (2007)

    Google Scholar 

  15. Htat, K.K., Williams, P.A.H., McCauley, V.: Security of ePrescriptions: data in transit comparison using existing and mobile device services. In: ACSW 2017, Proceedings of the Australasian Computer Science Week Multiconference, Article no. 56, Geelong, Australia, 30 January–3 February 03 (2017)

    Google Scholar 

Download references

Acknowledgments

The authors thank our colleagues from K L University who provided knowledge and encouragement that eminently assisted the research carried by us.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pinki Prakash Vishwakarma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vishwakarma, P.P., Tripathy, A.K., Vemuru, S. (2018). A Layered Approach to Fraud Analytics for NFC-Enabled Mobile Payment System. In: Negi, A., Bhatnagar, R., Parida, L. (eds) Distributed Computing and Internet Technology. ICDCIT 2018. Lecture Notes in Computer Science(), vol 10722. Springer, Cham. https://doi.org/10.1007/978-3-319-72344-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72344-0_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72343-3

  • Online ISBN: 978-3-319-72344-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics