dc.contributor.author | Nyamtiga, Baraka | |
dc.contributor.author | Sam, Anael | |
dc.contributor.author | Laizer, Loserian | |
dc.date.accessioned | 2023-11-02T08:08:30Z | |
dc.date.available | 2023-11-02T08:08:30Z | |
dc.date.issued | 2013 | |
dc.identifier.uri | https://dspace.nm-aist.ac.tz/handle/20.500.12479/2399 | |
dc.description | A research article was submitted to INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 1, ISSUE 3 38 | en_US |
dc.description.abstract | Performing transactions using mobile devices is increasing rapidly in developing countries, Tanzania inclusive. USSD and SMS are among the technologies widely used in conducting mobile transactions. These two technologies have their strengths and weaknesses from perspectives of security of systems. They both utilize GSM Services and GSM Security is known to have inherent flaws in its encryption and authentication algorithms. A description for these platforms is given in this paper of what they are, their modes of operations, and an evaluation of their security as related to mobile banking systems. From the evaluations made; this paper suggests a method that is more secure for use in mobile banking systems. As a solution we
propose some security features being added to the existing systems in order to improve data confidentiality, message integrity and user authenticity. The suggestions are based on the capabilities for the technology to accommodate these additional features to protect data that will supplement the protection offered by the GSM | en_US |
dc.language.iso | en | en_US |
dc.publisher | IJTEEE | en_US |
dc.subject | Authentication | en_US |
dc.subject | Mobile Banking | en_US |
dc.subject | USSD | en_US |
dc.subject | SMS; | en_US |
dc.subject | Encryption | en_US |
dc.title | Security Perspectives for USSD versus SMS in conducting mobile transactions: A case study of Tanzania | en_US |
dc.type | Article | en_US |