Technology Challenges in Mobile Payments

Slides:



Advertisements
Similar presentations
Introduction to Public Land Mobile Network (PLMN)
Advertisements

Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
ARSITEKTUR DASAR SISTEM SELULER
GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
Hardware Infotech International is pioneer in producing and providing advanced payment hardware.
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Mobile Payment Forum of India (MPFI) Dr.V.N.Sastry, Executive Secretary, MPFI Professor, IDRBT May 30, 2014 : 10 th GBM of MPFI,
Mobile Payment Forum of India: Regulatory Sub-Committee Sachin Khandelwal June 07, 2008.
By Neha choudhary Asst.Professor CSE/IT LHST-A.  GSM-Introduction  Architecture  Technical Specifications  Characteristics and features  Applications.
Telefónica Móviles España GPRS (General Packet Radio Service)
Basic radio frequency communications - 2 Session 1.
Mobile Payments Index: Introduction Technologies Payment methods
The Wireless Communication System Xihan Lu. Wireless Communication Cellular phone system Cordless telephone system Bluetooth Infrared communication Microwave.
Mobile Payment Forum of India Technology sub-committee Presentation on mobile payments.
Information Security of Embedded Systems : Communication, wireless remote access Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
Mobile Handset Cellular Network Basics + GSM. Cellular Network Basics There are many types of cellular services; before delving into details, focus on.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
 The GSM network is divided into two systems. each of these systems are comprised of a number of functional units which are individual components of the.
Evolution from GMS to UMTS
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
ITEC0722: Mobile Business and Implementation: Mobile Payment and Security Suronapee Phoomvuthisarn, Ph.D.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
WIRELESS LAN SECURITY Using
GSM: The European Standard for Mobile Telephony Presented by Rattan Muradia Requirement for course CSI 5171 Presented by Rattan Muradia Requirement for.
Members of our Presentation  (Bsts09-08) Hafiz Umer Ejaz  (Bsts09-09) Rai-Habib Ullah  (Bsts09-31) M.Arsalan Qureshi  (Bsts09-32) Shoaib Ansari 
GSM,GPRS & CDMA Technology
GSM Network Structure Lance Westberg.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
GSM TOWARDS LTE NETWORKS Lecture # 2. CELLULAR GENERATIONS First Generation Wireless : Analog Second Generation Wireless (2G): Digital Second Generation.
Dr. V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI to 84 October 30,
Chapter 4 Application Level Security in Cellular Networks.
GSM NETWORK ARCHITECTURE CH 2. In this chapter we will see : In this chapter we will see : 1.GSM NETWORK ARCHITECTURE 2.The Radio Subsystem 3.The Network.
WIRELESS COMMUNICATION GSM NETWORK OVERVIEW LECTURE 4 Tanvir Ahmad Niazi Air University, Islamabad 1.
Heidelberg, 25 February 1999 MTM’99 Workshop Terminal and Application Aspects of the Evolution of Broadband Mobile Services EURESCOM P809 Mobility in.
GSM Network Architecture
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Mobile Payments: Key IT Law Issues Sony Gokhale October 26, 2015
Overview of cellular system
(Global System for Mobile Communication)
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
1 Wireless Networks Lecture 16 GSM: Global System for Mobile Communication Dr. Ghalib A. Shah.
1 Lecture 19 EEE 441 Wireless And Mobile Communications.
Cellular Network Base stations transmit to and receive from mobiles at the assigned spectrum Multiple base stations use the same spectrum The service area.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Overview of the GSM for Cellular System
Wireless Network PMIT- By-
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Global System for Mobile Communications
GSM SECURITY AND ENCRYPTION
GSM.
Wireless Communications MOBILE COMMUNICATIONS Lecture:7
Global system for Mobile Communications
Data Communication and Networks
Data Communication and Networks
Data Communication and Networks
Data Communication and Networks
Dept. of Business Administration
LM 7. Cellular Network Security
Presentation transcript:

Technology Challenges in Mobile Payments Dr.V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI Road No.1, Castle Hills, Masab Tank, Hyderabad 500057 E-Mail : vnsastry@idrbt.ac.in Ph: 91-40-23534981 Test : 9440803813 (M) & MMID : 9211933 January 30, 2012 at IDRBT for the EDP

Outline Mobile Payment Technologies Technology Challenges Some innovative developments March 29, 2012

Classification of Mobile Payments Based on the validation of the tokens exchanged Based on Value Based on Location Based on Charging method Micro Payments Remote Payments Post-paid Online Payments Mini Payments Pre-paid Proximity Payments Offline Payments (ex: e-coins in P2P transfers) Macro Payments March 29, 2012

Enabling Mobile Technologies Transport Security enablers Platforms User Interface Voice SIM Long-range Short-range SAT SMS WPKI/WIM Java ME Infrared GSM USSD Bluetooth GPRS Dual slot phones WAP Java Card RFID 3G NFC 4G March 29, 2012

Technology Challenges Device Level Application Level Communication Level User Level Security Level Standards Level Consolidation Level March 29, 2012

Device Level Challenges Variation in Features and Functionalities, look and feel, text size, recharging frequency, OS User Awareness and Education Voice, Data, MMS, interactivity, real time response, location aided feature etc. properly used ? March 29, 2012

Mobile Application Level Challenges Is the Mobile Payment Application Developed in Conformance to standards ? Is it interoperable ? On which folder client application is to be downloaded ? how to install and run a mobile payment application ? Is the design optimized for execution in limited phone memory? Has it been Tested and certified by Trusted entity ? Can the customer wait for the delay to get it for his/her new model ? March 29, 2012

Communication Level Challenges Which channel to use : SMS, USSD, GPRS, DTMF ? What way mobile banking convenience is enhanced by 2G, 3G, 4G ? When and how to use Wireless Communication Technologies : Bluetooth, Zigbee, Wi-max, Wi-fi , LTE ? March 29, 2012

Mobile Communication Architecture Mobile Stations Base Station Subsystem Network Management Subscriber and terminal equipment databases BTS OMC Exchange System VLR MSC BSC HLR AUC BTS EIR March 29, 2012

Interbank Mobile Payment Service (IMPS) Settlement (CCIL) Switching (NPCI) Bank - A Bank -B Interbank Mobile Payment Service (IMPS) Payer-X Payee- Y March 29, 2012

User Level Challenges Local language support on Mobiles Generation of Transaction report Mobile Application on Phone memory or SIM or memory card ? Trace of transaction data or critical personal data : access by others Mobile Wallet : risk of multiple cards in the device and value offload for cash exchange in local currency Mobile based Financial Inclusion services Complaint registration and Grievance resolution March 29, 2012

Mobile based Financial Inclusion and Biometric Authentication ( UIDAI ) Settlement (CCIL) Switching (NPCI) Bank A Bank B Mobile based Financial Inclusion and Mobile Wallet BC Micro ATM ATM / Merchant PoS Customer March 29, 2012

Security Challenges Authentication User, Device, Application, Transaction Direct, Indirect Factors : You Know (UK), You Have (UH), You Are (UR) One Way from source (S) to destination (D) Mutual between source, destination or intermediate entities as Telco , Mobile Payment Provider, Bank Server, Switching agency. Encryption & Decryption Using Cryptoghaphy Symmetric key ( Password, m-Pin ) Asymmetric key (PKI , WPKI ) Layers of OSI Model Access Control Models Between Source (S) and Destination (D) MPP to Bank : SSL / TCP Bank to NPCI : SSL/TCP March 29, 2012

Major 3 Sections of a Mobile Phone Power Section Power distribution Charging section Radio Section Band Switching RF Power Amplification Transmitter Receiver Computer Section CPU (central processing unit) Memory (RAM,FLASH,COMBO CHIP) March 29, 2012

Some reported attacks on Mobile Phones Phishing Botnet Fake Player Trojan horse Bluejacking (Symbian ) BlueBug BlueSnarfing BluePrinting Cabir (First in 2004 ) Comwar Skulls Windows CE virus March 29, 2012

Mobile Station Mobile Equipment (ME) is identified by International Mobile Equipment Identity (IMEI) Number Subscriber Identity Module (SIM) Card has keys, identifiers and algorithms Identifiers Ki – Subscriber Authentication Key IMSI – International Mobile Subscriber Identity TMSI – Temporary Mobile Subscriber Identity MSISDN – Mobile Station International Service Digital Network PIN – Personal Identity Number protecting a SIM LAI – location area identity STK ( SIM Application Toolkit) allows applications in the SIM to interact with any ME ETSI GSM 11.14 standard defines the interface between the SIM and the interoperable ME . March 29, 2012

SIM Card Mobile Payment Application can be installed on either ME or SIM . The application burnt on the SIM card gives by far the most secure application environment. The mobile application can be stored on its own security domain and hence prevented from others having access to it.  Forensic tools and procedures exist that can be used to bypass built-in security mechanisms and recover the contents of a device. Both software and hardware-based methods are available for data recovery, including those that exploit existing vulnerabilities. A number of GSM mobile phones allow acquisition with a forensic tool, if a PIN-enabled (U)SIM is missing or removed from the device. It is also possible to create substitute (U)SIMs for certain models of phones that fools them into treating the (U)SIM as the original, and allowing access.   March 29, 2012

Security at Mobile Channel Level Voice Channel : DTMF for IVRS Text Channel : SMS, USSD MMS Channel : GPRS GSM Security Mechanisms Equipment Identity Register (EIR) Black list – stolen or non-type mobiles White list - valid mobiles Gray list – local tracking mobiles Central Equipment Identity Register (CEIR) Approved mobile type (type approval authorities) Consolidated black list (posted by operators) March 29, 2012

Security at Mobile Application level Client Application developed by the Mobile Payment Provider (MPP) Server Application of the MPP at the Bank level Security Testing Key Generation and storage process Check Sum implemented Reaching to the destined address only ? March 29, 2012

Multiple Standard Challenges ISO Standards IEEE Standards PCI DSS Standards Regulatory Standards Global platform Standards EMV Standards NIST Standards SFMS, SWIFT Standards NFC Standards March 29, 2012

Mobile ad hoc network technologies Technology Standard Theoretical Bit Rate Frequency Range Power Consumption IEEE 802.11b 1,2,5.5, 11 Mbits/s 2.4 GHz 100m-500m 30mW IEEE 802.11g Upto 54 Mbits/s 25-50m 79mW IEEE 802.11a 5 GHz 40m 250mW Bluetooth IEEE 802.11.15.1 1 Mbits/s 10 m-100m 1mW UWB (IEEE 802.15.3) 110 - 480 Mbit/s 10 GHz 10m 200 mW Hiper LAN2 150m IrDA 4Mbits 850 nm 10 m 200mW IEEE 802.11n 600 Mbits/s 100m - 250m 1500W March 29, 2012

Consolidation Level Challenges Server capabilities to handle high volume mobile payment transactions Periodic and round the clock clearing services for mobile payments Net and Real time funds settlement between Banks Cash management issues at ATMs on account of high velocity mobile payments. Offering Mobile Banking Application as a Cloud Service March 29, 2012

Some Innovative solutions of Mobile Payments in India: Bringing all stakeholders of Mobile Payments into one platform by the Mobile Payment Forum of India (MPFI) in 2006 Use of Mobile Phone Number and MMID only for Mobile Payments Use of AADHAR number and BIN for Mobile Payments Use of USSD based Mobile Payments Development of MANETS for Financial Inclusion by IDRBT And many other solutions reported in the workshop March 29, 2012

MANET Ecosystem for Mobile Payments MANET nodes. Gateway. Backbone Network. Bank Server. Fixed Relay. March 29, 2012

Mobile ad-hoc Network (MANET) It is a Mobile wireless network. MANET nodes are rapidly deployable, self configuring and capable of doing autonomous operation in the network. Nodes co-operate to provide Connectivity and Services. Operates without base station and centralized administration. Nodes exhibit mobility and the topology is dynamic. Nodes must be able to relay traffic sense. A MANET can be a standalone network or it can be connected to external networks(Internet). March 29, 2012

MANET based Mobile Payments Cellular Network /Satellite Technology Internet / Private LAN Gateway Backbone I MANET node Fixed Relays Village Bank Server Mobile ad hoc Network March 29, 2012

Testbed Cellular Network/ ISDN/PSTN/ LLN/ Satellite Network Mobile Node A 192.168.1.2 Mobile Node C 192.168.1.3 192.168.1.1 Mobile Node B 192.168.1.3 Gateway Fixed Relay Mobile Node D 192.168.1.4 Bank-A Server 172.16.0.8 Bank-B Server 162.16.6.124 MANET in a Village March 29, 2012

Thank you... March 29, 2012