Transaction Security Using Input Based Shared Key Cryptography

Mobile devices are growing day by day, so the mobile database. Transactions from ATM machines are a good example of wireless Transactions. Since these transaction flows using medium as air hence security is a issue till the transaction reaches the Base station from where the transaction is much more secure as compared to wireless network. In this paper a new scheme of securing database transaction is proposed till it reaches the Base station. This is also required to provide security against frequent disconnections (2)(5).

[1]  Z.T. Abdul-Mehdi,et al.  Multi-Check-Out Timestamp Order Technique (MCTO) for Planned Disconnections in Mobile Database , 2006, 2006 2nd International Conference on Information & Communication Technologies.

[2]  Abdelsalam Helal,et al.  A mobile transaction model that captures both the data and movement behavior , 1997, Mob. Networks Appl..

[4]  R. Mahmod,et al.  Security Management Model for Mobile Databases Transaction Management , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.

[5]  Behrouz A. Forouzan,et al.  Data Communications and Networking , 2000 .