Analysing Architecture and Transaction Model in Securing Mobile Commerce

Analysing Architecture and Transaction Model in Securing Mobile Commerce

Poonam Ahuja Narang (Guru Tegh Bahadur Institute of Technology, India) and Basanti Pal Nandi (Guru Tegh Bahadur Institute of Technology, India)
Copyright: © 2016 |Pages: 24
DOI: 10.4018/978-1-5225-0236-4.ch010
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Mobile communication is becoming one of the most popular and high growth area in recent times, credit for this rapid growth goes to new research and inventions in all areas of mobile and wireless technology. Use of 3G is growing rapidly; on the other hand, 4G lead the way for next generation of mobile communication. This chapter describes the Mobile Architecture Layers and flow of transactions and shows comparison between Existing Transaction models. Threats and Risks associated with mobile transactions are primary concern along with the security techniques on various payment modes. Database security is also a part of the discussion of this chapter.
Chapter Preview
Top

Background

With the advancement of mobile technology mobile transaction is used not only for voice traffic but also for data centric transaction. Wu et al. (2002) designed a framework for seamless integration of heterogeneous wireless system which considers challenging issues on mobile IPV6 support, QoS management over IP, location management, routing, handoff and security. Gu et al. (2004) proposed a service oriented context aware middleware (SOCAM) architecture for building and rapid prototyping of context aware mobile services. Zhang (2012) has proposed Trusted Stack Model which is based on Design Science Research Methodology (DSRM) Process Model. It provides secure, flexible, scalable and extendible environment for mobile transaction which also supports security service which is the primary concern of this chapter.

Complete Chapter List

Search this Book:
Reset