Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications

Show simple item record

dc.contributor.author Luanda, A
dc.contributor.author Kimani, S
dc.contributor.author Kimwele, M.
dc.date.accessioned 2017-05-23T10:38:53Z
dc.date.available 2017-05-23T10:38:53Z
dc.date.issued 2017-05-23
dc.identifier.uri http://s3.amazonaws.com/academia.edu.documents/36435981/publication_-Identifying_threats_associated_with_MANA.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&Expires=1495539427&Signature=RsHoE%2B6IM%2Fm9sR7%2FGybzlQCU8TM%3D&response-content-disposition=inline%3B%20filename%3DIdentifying_threats_associated_with_Man.pdf
dc.identifier.uri http://hdl.handle.net/123456789/3151
dc.description.abstract Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as a mobile phone or Personal Digital Assistant (PDA). Mobile banking has until recently most often been performed via SMS or the Mobile Web. Apple's initial success with iPhone and the rapid growth of phones based on Google's Android (operating system) have led to increasing use of special client programs, called apps, downloaded to the mobile device hence increasing the number of banking applications that can be made available on mobile phones . This in turn has increased the popularity of mobile device use in regards to personal banking activities. Due to the characteristics of wireless medium, limited protection of the nodes, nature of connectivity and lack of centralized managing point, wireless networks tend to be highly vulnerable and more often than not they become subjects of attack. This paper proposes to identify potential threats associated with communication between a mobile device and the back end server in mobile banking applications. The paper should be able to identify the techniques associated with Man in the middle attacks during communication between a mobile device and a back end server and propose controls that will ensure that data theft does not occur during such sessions. en_US
dc.language.iso en en_US
dc.publisher IOSR Journal of Computer Engineering (IOSR-JCE) en_US
dc.relation.ispartofseries IOSR Journal of Computer Engineering (IOSR-JCE);(2014): 35-42.
dc.subject man in the middle attack en_US
dc.subject mobile banking applications en_US
dc.subject secure communication en_US
dc.subject JKUAT en_US
dc.subject Kenya en_US
dc.title Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account