Department of Computer Engineering
Presentation on “Seminar And Technical Communication”
Date: 22/10/2024
“Secure Mobile Payments With Advanced Cyber Security:
A Extensive Study”
Presented By: Mr.Ghogare Anant Rahul Guided By: Dr.P.B.Vikhe
*CONTENTS*
● Abstract
● Introduction
● Methodology
● Literature Review
● Advantages
● Disadvantage
● Application
● Conclusion
● References
Abstract:-
Mobile phones have become an inseparable friend for many
users, serving much more than just communication tools.
Every person wants to manage his/her daily transactions
and related issues by using his/her mobile phone. In this we
will discuss different security mechanisms involved in
MPS, and provide analysis of technologies, used in MPS.
Secure Mobile Payments With Advanced Cyber
Security : A Extensive Study
❖ Introduction:-
In today's digitally connected world, mobile payments have
become an integral part of everyday life. This introduction sets
the stage for an extensive study that delves into the critical
intersection of mobile payments and advanced cyber security,
emphasizing the importance, evolution, and key focus areas of
this dynamic field.
What is Cyber Security?
- Cyber Security is practice of defending Computers,
Servers, Mobile Devices and data from malicious attack.
- Cyber Security is important because it protect all
categories of data from theft and damage.
What is Mobile Payment System?
1. Mobile Payments are typically completed using a digital
wallet or mobile app, and can be linked to bank account,
credit card , debit card ,and other payment method.
2. There are different types of mobile payment system:
Mobile browser-based payment.
In-app mobile payment
Mobile or wireless credit card reader
Major Components of Mobile
Payment System.
CONSUMER/CUSTOMER
MERCHANT/SELLER
SERVICE PROVIDER
BANKS
Needs of Mobile Payments security :-
1. Data Encryption: Robust encryption of data during
transmission and storage to protect sensitive information
from unauthorized access.
2. Authentication: Implement strong user authentication
methods, such as biometrics or multi-factor authentication, to
ensure that only authorized users can make transactions.
Literature Review:-
Title Methodology Algorithm used Gap Analysis
Scenario for The speed,
m-payment models. QR Coding transaction is
--- intended by the
merchant for more
reliable and accurate
connection.
Short Message Short Message Peer to peer Provide the privacy
service service and transition can be
done by transmitting
the mobile numbers.
Algorithm For
E-Payment System
Ways of E-payment System
1.Credit Card
2.Debit Card
3.Smart Card
4.Electronic Fund Transfer
Methodology :–
Encryption technology-
It include Symmetric encryption and Public-key encryption.
1) SYMMETRIC KEY ENCRYPTION (SKE):-SKE system uses a
common key to encrypt messages, which means both sender and receiver
will hold a common key for encryption and decryption. Symmetric
encryption is still commonly used in insecure data communication.
2) PUBLIC-KEY ENCRYPTION (PKE):- PKE system is a type of
asymmetric encryption because the same key is not used to encrypt and decrypt
the messages. In the PKE system, two different keys are used, called public and
private key
❖ Advantages :-
1. Mobile payment acceptance improve customer service.
2. Increase customer convenience.
3. Time efficiency.
4. Accessing the bank 24/7.
Disadvantages:-
1. One disadvantage of mobile payment systems is the potential
for security risks. Mobile payments can be vulnerable to fraud,
hacking, and data breaches, putting users' sensitive financial
information at risk if proper security measures are not in place
Applications of Mobile Payment System: -
1. Samsung pay.
2. Google pay.
3. Phone pay.
4. Paytm.
5. Amazon pay.
❖ Conclusion: -
● This PPT discussed various payment schemes and their
usage, technology, and provided security mechanisms.
● Most payment methods are account-based payment systems,
and their main focus is on security, privacy, confidentiality,
and authentication.
● We discussed different aspects of MPS, including
advantage, disadvantages and methodology in MPS form
different aspects
❖ References :-
1. https://ieeexplore.ieee.org/document/9514868
2. M. Rouse. (2017). Single-Factor Authentication (SFA). [Online]. Available:
https://searchsecurity.techtarget.com/
3. Secure Network Architectures and Protocols" by Christos Stergiou and Dimitrios
D. Vergados.
4. A. Rahav. (2018). The Secret Security Wiki. [Online]. Available: https:
//doubleoctopus.com/security-wiki/authentication/single-factorauthentication/
Thank You