Article Preview
TopIntroduction
The rapid development of e-commerce and wide-spread usage of mobile devices have emerged e-business using wireless technologies (Pasupuleti et al., 2016; Sukumaran & Mohammed, 2018; Tian et al., 2013). Despite of the pervasiveness of the wireless networks, there has been huge need for mobile services such as dynamic location based services, communication services and entertainments services (Arsalan et al., 2019; Kittur & Pais, 2017; Kundu et al., 2020; Oh et al., 2018). Amidst these services, the impact is high upon the mobile transaction services through the mobile communication systems such as mobile auctions, mobile payments, and mobile banking. Even though mobile devices provide immediacy, convenience, user friendliness, personalization for consumer transactions, reliability was given more importance. It is considered as one of the prime factors in the wireless channels which are prone to attacks such as impersonisation, eaves dropping (Chou et al., 2010; Guo et al., 2011; Mihaljević & Oggier, 2010). The mobile communication system needs wireless channels to establish secure communication and perform any transactions(G. Rajesh et al, 2018). In this scenario, error correction and secure transmission needs concentration in wireless channels that can be achieved through coding algorithms and ciphering algorithms respectively (Ktari et al., 2017; Martiri & Baxhaku, 2012; Park & Ogunfunmi, 2017; You & Sang, 2010). Presently, GSM uses coding and ciphering for mobile communication systems. In GSM module, Error correction techniques should have been implemented at the receiver’s end to withstand the errors whereas encryption to preserve the privacy of the user. The literature (Arsalan et al., 2019; Husni, 2017; Troja & Bakiras, 2017) says that such a secure mechanism was deployed in the mobile communication systems were not taken into consideration for mobile wallets.
The objective of the mobile wallet is to provide instant transactions with the help of mobile wallets in the mobile device. Contact commerce gives business chances to mobile system administrators similar to cloud suppliers. Touch commerce can be characterized as a rich portable innovation that climbs up bound together flexible assets of convenient advancements towards unhindered usefulness, stockpiling, and portability to serve a large number of mobile devices. Touch commerce utilizes the Internet to convey applications to mobile devices. These mobile applications can be utilized remotely with speed and adaptability with the Internet and advanced devices. It will give the fundamental dimension of computing service that is viewed as basic need to meet the ordinary needs of the general network.
Unfortunately, there are problems such as battery limit and, expanding request from clients for energy consuming applications in mobile wallets. The huge data flow has resulted in the enforcement of secure point to point associations between vendors, clients and communication in the network (Black, 1993; Hassinen et al., 2008; Ruiz-Martínez et al., 2011; Standard et al., 1976; Xue et al., 2018). In this regard, the identity of the client initiating the secure transaction using mobile applications has to be enhanced. Firstly, the transaction information needs to be sent safely to the vendor without allowing any disclosure in between. Secondly, the secrecy of the transactional information has to be maintained through an encryption algorithm. Thirdly, to protect the message being transmitted from the client to the vendor, digital signature (Black, 1993; Guo et al., 2011; Liao & Hsiao, 2013; Mihaljević & Oggier, 2010) is applied to prove the identity of the sender and also to ensure that the content is not modified during the transmission. The proposed work in the article concentrates on developing a security solution which is applicable to the mobile wallets in all the concerns discussed above. The objective of this work is to encode and sign the data digitally before transmitting it over the wireless channel through which communication takes place. This paper consists of four sections. Section 2 deals with the research background and literature on the needs for encoding and signature in the mobile transactions. Section 3 describes the proposed framework and the proposed algorithm to enhance the security in the mobile applications. Section 4 carries the proof of security for the proposed algorithm. Section 5 concludes the merits of the proposed work and introduces the scope of the future work.