Show simple item record

dc.contributor.authorNyamtiga, Baraka
dc.contributor.authorSam, Anael
dc.contributor.authorLaizer, Loserian
dc.date.accessioned2023-11-02T08:08:30Z
dc.date.available2023-11-02T08:08:30Z
dc.date.issued2013
dc.identifier.urihttps://dspace.nm-aist.ac.tz/handle/20.500.12479/2399
dc.descriptionA research article was submitted to INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 1, ISSUE 3 38en_US
dc.description.abstractPerforming transactions using mobile devices is increasing rapidly in developing countries, Tanzania inclusive. USSD and SMS are among the technologies widely used in conducting mobile transactions. These two technologies have their strengths and weaknesses from perspectives of security of systems. They both utilize GSM Services and GSM Security is known to have inherent flaws in its encryption and authentication algorithms. A description for these platforms is given in this paper of what they are, their modes of operations, and an evaluation of their security as related to mobile banking systems. From the evaluations made; this paper suggests a method that is more secure for use in mobile banking systems. As a solution we propose some security features being added to the existing systems in order to improve data confidentiality, message integrity and user authenticity. The suggestions are based on the capabilities for the technology to accommodate these additional features to protect data that will supplement the protection offered by the GSMen_US
dc.language.isoenen_US
dc.publisherIJTEEEen_US
dc.subjectAuthenticationen_US
dc.subjectMobile Bankingen_US
dc.subjectUSSDen_US
dc.subjectSMS;en_US
dc.subjectEncryptionen_US
dc.titleSecurity Perspectives for USSD versus SMS in conducting mobile transactions: A case study of Tanzaniaen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record