Honeypots: Tracking Hackers
Assessment of Today's Mobile Banking Applications from the View of Customer Requirements
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7 - Volume 7
Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Advances in Security and Payment Methods for Mobile Commerce
Advances in Security and Payment Methods for Mobile Commerce
Are Mobile Payment and Banking the Killer Apps for Mobile Commerce?
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
A modeling approach and reference models for the analysis of mobile payment use cases
Electronic Commerce Research and Applications
Bluetooth Network-Based Misuse Detection
ACSAC '08 Proceedings of the 2008 Annual Computer Security Applications Conference
Network Security
Mobile electronic identity: securing payment on mobile phones
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
This network is infected: HosTaGe - a low-interaction honeypot for mobile devices
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
Hi-index | 0.00 |
Wireless technologies provide a new channel for implementation of mobile payments systems. In this regard, the potential of short-range wireless technologies such as Bluetooth is enormous. These systems can be used for proximity payment to vending machines or offering banking service in the bank area. However, unsolved security issues are the biggest barriers to the growth of mobile payment. This paper is focused on the security of banking services which can be offered through Bluetooth technology. We propose a solution using honeypots in bank environment to mitigate the risk of Bluetooth-enabled payment transactions. In this paper, we try to elaborate how honeypot systems can be exploited to reduce the chance of Bluetooth enabled attacks' success by limiting the client device discoverability for attackers.