Ranking secure technologies in security provision financial transactions mobile commerce

The high level of mobile phone penetration in comparison with fixed Internet is one of the main reasons why most developing countries propel to provide mobile commerce services. One of the most important challenges in the mobile commerce area is the security issue. Different papers have discussed various aspects of secured networks. But, heretofore a comprehensive ranking approach has not been presented to overcome the security issues. In this paper, it's been tried to analyze the security technologies from financial transactions perspective. Attention to the importance of security in financial transactions is significant, mobile technologies had been discussed and studied for their usage in financial transactions. To become specified purpose of providing security one type of specified services, which security technologies and how much are needed, from 5-Scale Likert questionnaire has been developed and distributed among experts. Actually, this work has been done using the expert's opinions and analysis of the results through the multi-index decision making and Friedman ranking test methods. The results show that in this method, digital signature, cryptography and Steganography, have the same values using two methods and they are in good interaction and the value of the Cronbach's Alpha was equal to 0.951 in this paper.

[1]  D. Brent Chapman,et al.  Network (In)Security Through IP Packet Filtering , 1992, USENIX Summer.

[2]  Perry B. Gentry What is a VPN? , 2001, Inf. Secur. Tech. Rep..

[3]  Ulla Koivukoski,et al.  Managing Mobile Services: Technologies and Business Practices , 2005 .

[4]  Silvana Trimi,et al.  M-government: technologies, applications and challenges , 2008, Electron. Gov. an Int. J..

[5]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[6]  D. Richard Kuhn,et al.  SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure , 2001 .

[7]  Robert W. Shirey,et al.  Internet Security Glossary , 2000, RFC.

[8]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[9]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[10]  Upkar Varshney,et al.  Supporting Mobile Commerce Applications Using Dependable Wireless Networks , 2002, Mob. Networks Appl..

[11]  Steve Burnett,et al.  RSA Security's official guide to cryptography , 2001 .

[12]  W. Douglas Maughan,et al.  Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.

[13]  John A. Clark,et al.  A Survey of Authentication Protocol Literature , 2010 .

[14]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[15]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[16]  Athanasios Karantjias,et al.  A Secure Mobile Framework for m-Services , 2008, 2008 Third International Conference on Internet and Web Applications and Services.