Affiliation:
1. Guru Tegh Bahadur Institute of Technology, India
Abstract
Mobile communication is becoming one of the most popular and high growth area in recent times, credit for this rapid growth goes to new research and inventions in all areas of mobile and wireless technology. Use of 3G is growing rapidly; on the other hand, 4G lead the way for next generation of mobile communication. This chapter describes the Mobile Architecture Layers and flow of transactions and shows comparison between Existing Transaction models. Threats and Risks associated with mobile transactions are primary concern along with the security techniques on various payment modes. Database security is also a part of the discussion of this chapter.
Reference43 articles.
1. Abdul-Mehdi, Z. T., & Mahmod, R. (2008, April). Security Management Model for Mobile Databases Transaction Management. In Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on (pp. 1-6). IEEE.
2. Agarwal, S., Khapra, M., Menezes, B., & Uchat, N. (2007, December). Security issues in mobile payment systems. In Proceedings of ICEG 2007: The 5th International Conference on E-Governance (pp. 142-152).
3. Framework for Transaction Execution Strategies in Mobile Data Base Systems
4. Performance Evaluation of Transaction Processing in Mobile Data Base Systems
5. Becher, M., Freiling, F. C., Hoffmann, J., Holz, T., Uellenbeck, S., & Wolf, C. (2011, May). Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices. In Security and Privacy (SP), 2011 IEEE Symposium on (pp. 96-111). IEEE.