You are on page 1of 7

JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 27 

Secured Mobile Banking System with an Efficient


Bandwidth and Prevent the Delay Time
Hamdan O. Alanazi, Prof. Dr. Patrice Boursier 

Abstract--In the past, the banks used to do the banking manually and there were very long queue with low services for the
customers. In this age of technology and with the fast growth of local mobile customers, more banks are actively competing for a
larger slice of the mobile banking business. Banks which have Internet banking services are looking to further improve this
relatively new service while the smaller ones are beginning to look at it more seriously. In this paper, the secured mobile banking
system has been proposed to avoid the delay and to get high bandwidth and to do the banking flexibly and safely.
 
Index Terms— Mobile Banking, Bandwidth, Delay Time, and Mobility Problems.
 
——————————      —————————— 
industry globally. An impact of information
technology in the banking sector is the introduction
of mobile banking. Earlier studies have shown the
1. INTRODUCTION usefulness of mobile banking in facilitating the
The evolution of science world has moved from financial transactions between banks and their
stagnation to speed on everything, and the urgent customers [1],[2]. However, these earlier studies on
need for a computer in all aspects of life led today mobile banking and factors influencing its usage
to change our life. Life now looking for have produced mixed results. In [1] found
sophistication over all starting from the small things perceived usefulness to be less significant in
reach to the big things, every thing in our life explaining the adoption of mobile financial services.
become electronic, mail it became Email, bank it On the other hand [2], concluded that perceived
became Ebank, in general life it became elife. With usefulness to be a significant factor in mobile
this development in science and these changes in banking. Also, in [3] he found risk to be a very
life made lot difficulties because the security significant factor in adopting mobile banking. Due
issue[5],[6],[7],[8],[9],[10],[11],Nowadays[12][13][14] to these differences, research on mobile banking
[15][16][17][18][19][20][21],these applications which remains inconclusive and needs further
are classified as security applications for very investigation.
important to human life [22][23][24][25][26][27]. on
the other side make life easier, our job is reduce this 2. MOBILE BANKING BACKGROUND
difficulties and make life more easy. Nowadays
every one talk about ebank and mbank actually
both of them represent emoney or (transactions The first mobile banking and payment initiatives
with out cash). In this paper , the auther will focus were announced during 2003 (the same year that
on the mobile banking, as the auther mansion in the Fundament deployed their first prototype). The first
proposal there are lot of problems in this major deployment was made by a company called
technology since it new technology, the auther Pay box (largely supported financially by Deutsche
classify this problems to economic problems and Bank). The company was founded by two young
technical problems, in the proposed system the German’s (Mathias Entemann and Eckart Ortwein)
auther try to solve the technical problems (related to and successfully deployed the solution in Germany,
computer) by using a command method to reduce Austria, Sweden, Spain and the UK. At about 2003
this problems. Today, the advancement of mobile more than a million people were registered on Pay
technologies has provided an opportunity for box and the company was rated by Gartner as the
financial providers in Introducing new financial leader in the field [4]. Unfortunately Deutsche Bank
innovations. One of the emerging financial withdraws their financial support and the company
innovations introduced by financial providers is had to reorganise quickly. All but the operations in
mobile banking. The rapid development of Austria closed down. Today, there are huge
information technology has affected the banking researches in this area on the other hand whenever

 
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 28 
have developing system; weaknesses came again. Since this technology is new over the world, we
We found a study on the current area with a static find serious Problems fact.
value, from this study the auther came out with an
idea based on the problems. 4.1 FINANCIAL TRANSACTIONS PROBLEMS

3. PROBLEM BACKGROUND In the statistical case study the auther have noted
that: Technical problems (encryption, different
Mobile banking, which uses mobile devices for self- standards of devices/configuration problems,
service functions? Several major banks, including interface problems/ complexity, display/ GUI
Citibank, Wachovia, and Bank of America, have problems) 12 Bank of the 24 bank sample of the
launched mobile applications that will allow study. Usability (Speed of data transfer, display
customers to view their account balances, pay bills, size, WAP navigation) 12 Bank of the 24 bank
transfer money, and even call customer service reps sample of the study. Risk of acceptance 13 Bank of
with one click -- all using a cell phone or smart the 24 bank sample of the study. Delay of
phone. Contact less payment, which enables cell technological development (standardization, digital
phones to be used as payment devices instead of signatures, UMTS, lack of an overall standard) 6
credit cards. As a separate effort, top credit card Bank of the 24 bank sample of the study. Cost risks
issuers MasterCard and Visa are paving the way for 6 Bank of the 24 bank sample of the study. No
"contact less" payments, where cell phones serve as profound analysis of costs and benefits, no market
electronic wallets for purchases that can be made at analysis, no risk analysis 6 Bank of the 24 bank
CVS, McDonald's, and many other retailers. The sample of the study. High costs for users
phones use Near Field Communication, or NFC, a (particularly with UMTS (Universal Mobile
wireless technology for short-range Telecommunications System) in the future) 4 Bank
communications between electronic devices. Mobile of the 24 bank sample of the study. Start with a
marketing, which includes things such as loyalty narrow scope of features due to risks, service not
programs, ads, and electronic coupons? MasterCard attractive, 4 Bank of the 24 bank sample of the
plans to offer rewards and special offers via text study. Restrictions of SMS (content) 1 Bank of the 24
messages that customers can redeem when they bank sample of the study. Outsourcing problems 1
visit stores, as an incentive for using its mobile Bank of the 24 bank sample of the study. Finally, the
services. Similarly, Visa will provide customers time-consuming maintenance 1 Bank of the 24 bank
with electronic coupons on their cell phones as part sample of the study. Add to these problems the
of its payment-related services. Other companies mobility issues and the bandwidth and the security
have similar mobile marketing efforts under way. issues and so many think which is need to make a
"Banks are scrambling today to get customers to huge research to come out with a system which
sign up for their services," says Richard Crone, of minimize these problems. I can classify the
Crone Consulting. There were 236 million U.S. problems and weaknesses in to tow type.
wireless subscribers at the end of 2006 and their
data revenue totaled $4.8 billion in the fourth 4.2 COMPUTER PROBLEMS
quarter, according to research firm IDC. With
increased usage of data services, banks see this as 1-1 network problems (technical problems)
the right time to introduce their mobile apps. What (bandwidth, mobility) 1-2 security problems (risks,
the banks and the wireless carriers have yet to attackers).
figure out is how to get consumers to actually use
mobile banking and their cell phones as payment 4.3 ECONOMIC PROBLEMS
devices. Solving the challenge will require a lot of
industry collaboration, and a lot of trial and error, The proposed system will solve at least problems
of course.. Are you interested in mobile banking or which related to software, network security and
using your cell phone as a wallet? other related problems. The idea is not that gigantic
and also it’s not an imposable, it’s a merge between
methods; which is already implemented. However
these methods are certified by specialists also it
4. PROBLEM STATEMENT
proofed its cost affect; where. The auther try to
make it affective and efficient with lower cost,

 
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 29 
finally such technologies need to use new modern addition make a trust between the user and the
devices which might help to get the proposed bank.
results.

5. OBJECTIVE OF STUDY
8. SYSTEM INFRASTRUCTURE
This includes:
An overview over the system starting with the
environment, my plan for this system to work with
a. To study the different types of using mobile
GSM and 2G, 3G as wall once you click on the
agent in our life.
application in your mobile you may login by insert
b. To design and implement m-bank system which your username and your password as show as in fig
solve the security issues and not affecting on 1:
the bandwidth.

c. To find the solution for delay by using a low


bandwidth in the proposed system so that
minimize the mobility problem.

d. To test the proposed system to not be able to


attacked.

6. SYSTEM DESCRIPTION
Fig 1. Shown the login Interface.
Through the previously study, the auther find that
most of the problems in the previously mentioned Your mobile send a request to the main bank, the
focus in to two things: server in the main bank verify your username and
your password as shown as in the fig 2, after that
1. User should be trust on the system (security the main bank send back the ID and the password
problems) since it related to the money. of the nearest branch to your area as shown as in
the fig 3, and then the branch verify this ID and
2. Technology problems like delay. password, once it have been verified you get. A
new page in your mobile as shown as in fig 4. And
7. PROPOSED SOLUTIONS then browse your account as shown as in fig 5

Proposed system solutions is divided into two


types,

1. Distribution users on the banks branches not


with the main Bank only, there is more than one
way to distribute users to bank branches, such as:
The distribution depending on where they are
registering, and here it possible to get problems,
first Users variation volume with each branch
which is need different type of servers for each
branch depend on the number of users, second
distribution of users depend on the current
geographic area which is the most commend
solution.

2. Come with a good way for checking Fig 2. Shown The Main bank Verify your Username
authentication and make a high level of security this
and password

 
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 30 
This interface look like the ATM machine, as we see
it's easy to be friendly with this UI as shown in the
fig 6.

Fig 3. Shown that Your mobile may login automatically to


this branch after the previous login. Fig 6. Shown the interface look Like the ATM
Machine

If you have a mobile with a touch screen only what


you need is to click on the function you want to use.
If your mobile is normal one than use the number
beside the function. For example you want to reload
your hand phone, press 4 there is other interfaces
ask you to insert the number you want to have a
reload for it as shown as in fig 7.

Fig 4. Shown the branch verify this ID and password, once it


have been verified you get

Fig 7 Shown the Chooser Interface from the Previous interface


which shown in the fig 6.

Once you insert the number and confirm with yes,


next step will be the confirmation with your
fingerprint, if is match than the server send you
back a report for this transaction. Note: in sated of
fingerprint chick there are two different methods:

1. Chick the scanned fingerprint in the mobile


phone and send yes or no to the bank to confirm the
Fig 5. Shown the mapping for Browse Your Account transaction.

 
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 31 
2. Scan the fingerprint and send it to the server to capabilities of consumers handsets. Each of the
chick there. bearer channels has unique requirements in
provisioning and securing applications, transactions
The most common is the first one since it doesn't and consumer data. The selected implementation
require a lot of process and it's more secure than option including bearer channel, vendor and value
send the fingerprint to the bank server (secure of proposition, should be driven by consumer
the fingerprint it self from stalling ). adoption of the technology, technical capability of
the handsets in the target market, affordability of
9. Evaluation of the Proposed System. the bearer channel, and the consumers ease of
accessing the service. In a nutshell, the system
Strength points in this part the auther will looking which has been presented makes the mobile
for the system, possibility for implementation, also banking very flexible and at the same time very
if the auther implement it, would it be familiar with secured. In addition, the bandwidth is increased by
us, let we say it's not that easy to be familiar with it, prevent the delay time.
Do you thing we can get the desired results To
answer all these questions the auther make a look
over the system and its interface, functions, First to
implement this system ,so the auther needed ACKNOWLEDGEMENT
between week and two week , since the auther have
most of codes on the internet like the ATM code This research was partially supported by the King
and fingerprint matching code. Second the auther Saud University, Riyadh, Saudi Arabia, the
think it will be easy to be familiar within the system University of Malaya, Kuala Lumpur, Malaysia and
in one week since most of interface design to be “Al-Madinah International University”, Shah Alam,
easy to use. Third If the system right the main Malaysia. First and foremost I would like to thank
objectives on the solutions proposed, the auther can “ALLAH” (SWT), most gracious and most merciful.
say that a successful. The system should have a I would like to thank Prof. Dr. Patrice Boursier for
high level of security like a fingerprint matching his continue support, encouragement and valuable
also easy to use, and access to the stage of discussions during my research work. I also would
confidence that make us users of this system. The like to express the deepest appreciation to Professor
auther found only one weakness in this system, this Abdullah Ben Abdul-Rahman Abdullah Al-
system require a type of mobile support the Othman, Dr. Ali ibn Sulaiman Al-Attiyah and Prof.
fingerprint its mean that there is a limited people Dr. Mohammad Khalifa Al-Tamimi. My thanks are
use this system. The use of fingerprints in this also extended to Dr. Ali bin Abdullah Alafnan, Dr.
system is a weak point in terms of financial, but do Abdullah Alsbail, Dr. Muhammed Al Arifi, Dr.
not forget that when city bank used the fingerprint Musaed AL-Jrrah, and Mr. Abdullah Alsbait.
in their dealings, the number of users of this system Dr.Khalid Alhazmi, Mr. Seraj, Mr. Khalid and all
increase for next two years. the staff in the King Saud University especially in
Applied Medical Science for their unlimited
CONCLUSION support. Without their notes and suggestions this
research would not have appeared. Finally, I would
Mobile banking is moving up on the adoption like to express my sincere gratitude to my family for
curve, which is evident in the number of their help and their unconditional support. A very
implementations known in the world and the level special vote of thanks is due to my beloved mother.
of interest and discussion around the technology
and its implementation. It is also evident in the AUTHOR’S PROFILE
number of technology providers emerging in the
mobile banking space. There are several choices
HAMDAN ALANAZI: He has
when considering how to implement mobile
banking. These choices include whether or not to obtained his bachelor’s degree
develop the technology within the bank, use a from the King Saud University,
shared infrastructure, or purchase the enabling Riyadh, Kingdom of Saudi
technology from one of many vendors. The choices Arabia. He worked as a lecturer
also include various mobile bearer channels, suited at the Health College in the
to differing market segments and differing Ministry of Health in Saudi Arabia, and then

 
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 32 
worked as a lecturer at the King Saud University. Data “, Journal of Applied Sciences. Vol.10, Issue.15, ISSN:
1812-5654, 2010, P.P 1656-1661.
Currently, he is a Master’s candidate at the Faculty
[13] Ali K. Hmood , Hamid A. Jalab, Z.M Kasirun, B.B Zaidan ,
of Computer Science & Information Technology at A.A Zaidan, “ On the Capacity and Security of Steganography
Approaches: An Overview ”, Journal of Applied Sciences,
the University of Malaya in Kuala Lumpur,
Vol.10 , Issue.16 , ISSN: 1812-5654, 2010, P.P 1825-1833,
Malaysia. He has published many articles. He is has (SCOPUS Cited Publication / ISI Web of Knowlge / Master
Journal List).
been reviewed in many journals. His research
[14] A.A.Zaidan, B.B.Zaidan, Fazidah Othman, “New Technique
interests are in Cryptography, Steganography, of Hidden Data in PE-File with in Unused Area One”,
Digital Watermarking, Network Security, Artificial International Journal of Computer and Electrical Engineering
(IJCEE), Vol.1, No.5, ISSN: 1793-8163, p.p 642-650. ,
Intelligence, pattern recognitions, signal processing December (2009), Singapore.
and image processing and Medical Applications. [15] A.A.Zaidan, B.B.Zaidan, Anas Majeed, "High Securing
Cover-File of Hidden Data Using Statistical Technique and
AES Encryption Algorithm", World Academy of Science,
REFERENCES Engineering and Technology (WASET), International Journal
of Science, Engineering and Technology, Vol.54, ISSN: 2070-
[1] Kleijnen, M. and Wetzels, M. and De Ruyter, K.,” Consumer 3724, P.P 468-479, June (2009), Paris, France.
acceptance of wireless finance”, 2004, Journal of Financial [16] A.A.Zaidan, B.B.Zaidan, “Novel Approach for High Secure
Services Marketing, Vol (8), P: 206-217. Data Hidden in MPEG Video Using Public Key
[2] Luarn, P. and Lin, H.H., “Toward an understanding of the Infrastructure”, International Journal of Computer and
behavioral intention to use mobile banking”, 2005, Computers Network Security, 2009, Vol.1, No.1, ISSN: 1985-1553, P.P
in Human Behavior, Vol (23), P: 873-891. 71-76, 30 October, Malaysia.
[3] Mattila, M., “Factors affecting the adoption of mobile banking [17] A.A.Zaidan, B.B.Zaidan, Hamid.A.Jalab,“ A New System for
services”, Journal of Internet Banking and Commerce, 2003, Hiding Data within (Unused Area Two + Image Page) of
Vol (8), P: 3-6. Portable Executable File using Statistical Technique and
Advance Encryption Standared “, International Journal of
[4] McKitterick, D. and Dowling, J., “State of the art review of
Computer Theory and Engineering (IJCTE), 2010, VOL 2,
mobile payment technology”, TCD Computer Science
NO 2, P.P 220-227, ISSN:1793-8201, Singapore.
Technical Reports, 2003, P: 1-22.
[18] Anas Majed Hamid, Miss Laiha Mat Kiah, Hayan .T.
[5] A.W.Naji, A.A.Zaidan, B.B.Zaidan, “Challenges of Hidden
Madhloom, B.B Zaidan, A.A Zaidan,” Novel Approach for
Data in the Unused Area Two within Executable Files”,
High Secure and High Rate Data Hidden in the Image Using
Journal of Computer Science, ISSN: 1549-3636, 2009, Vol.5,
Image Texture Analysis”, International Journal of Engineering
No.11, P.P 890-897, New York, USA, 2010, (SCOPUS Cited
and Technology (IJET) , Published by: Engg Journals
Publication / ISI Web of Knowlge).
Publications, ISSN:0975-4042, Vol.1,NO.2,P.P 63-69, 2009,
[6] B.B.Zaidan, A.A.Zaidan, Ali K. Hmood, Hamid A. Jalab, India.
“On the differences between Hiding Information and
[19] Hamdan. Alanazi, Hamid.A.Jalab, A.A.Zaidan, B.B.Zaidan,
Cryptography Techniques: An Overview”, Journal of Applied
“New Frame Work of Hidden Data with in Non Multimedia
Sciences, Vol.10, Issue.15, ISSN: 1812-5654, 2010, P.P 1650-
File”, International Journal of Computer and Network
1655, (SCOPUS Cited Publication / ISI Web of Knowlge /
Security, 2010, Vol.2, No.1, ISSN: 1985-1553, P.P 46-54, 30
Master Journal List).
January, Malaysia.
[7] Ali K.Hmood, B.B.Zaidan, A.A.Zaidan, Hamid A. Jalab, “An
[20] A.W.Naji, A.A.Zaidan, B.B.Zaidan, Shihab A, Othman O.
Overview on Hiding Information Technique in Images”,
Khalifa, “ Novel Approach of Hidden Data in the (Unused
Journal of Applied Sciences, Vol.10, Issue.18, ISSN: 1812-
Area 2 within EXE File) Using Computation Between
5654, 2010, P.P 2094-2100.
Cryptography and Steganography ”, International Journal of
[8] Ali K. Hmood, Hamid A. Jalab, Z.M Kasirun, A.A.Zaidan, Computer Science and Network Security (IJCSNS) , Vol.9,
B.B.Zaidan, “Hiding Data in Video File: An Overview”, No.5 , ISSN : 1738-7906, pp. 294-300, 30 May (2009), Seoul,
Journal of Applied Sciences, Vol.10, Issue.15, ISSN: 1812- Korea.
5654, 2010, P.P 1644-1649.
[21] Alaa Taqa, A.A Zaidan, B.B Zaidan ,“New Framework for
[9] Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B.Zaidan, High Secure Data Hidden in the MPEG Using AES
A.A.Zaidan,"A Novel Embedding Method to Increase Encryption Algorithm”, International Journal of Computer and
Capacity of LSB Audio Steganography Using Noise Gate Electrical Engineering (IJCEE),Vol.1 ,No.5, ISSN: 1793-
Software Logic Algorithm", Journal of Applied Sciences, 8163, p.p.566-571 , December (2009). Singapore.
Vol.10, Issue 1, ISSN: 1812-5654, 2010, P.P 59-64.
[22] B.B Zaidan , A.A Zaidan ,Alaa Taqa , Fazidah Othman ,“
[10] A.A.Zaidan, B.B.Zaidan, Ali K. Hmood, Hamid A. Jalab,” Stego-Image Vs Stego-Analysis System”, International
Investigate the Capability of Applying Hidden Data in Text Journal of Computer and Electrical Engineering
File: An Overview”, Journal of Applied Sciences, Vol.10, (IJCEE),Vol.1 ,No.5 , ISSN: 1793-8163, pp.572-578 ,
Issue.17, ISSN: 1812-5654, 2010, P.P 1916-1922. December (2009), Singapore.
[11] A.A.Zaidan, B.B.Zaidan, Ali K. Hmood, Hamid A. Jalab, “An [23] Anas.Majeed, A.A.Zaidan, B.B.Zaidan, Miss Laiha Mat Kiah.
Overview: Theoretical and Mathematical Perspectives for “Towards for Admission Control in WIMAX Relay Station
Advance Encryption Standared (AES)/Rijndael”, Journal of Mesh Network For Mobile Stations Out of Coverage Using
Applied Sciences, Vol.10, Issue.18, ISSN: 1812-5654, 2010, Ad-Hoc”, World Academy of Science, Engineering and
P.P 2161-2167. Technology (WASET), International Journal of Science,
[12] Mohamed Abomhara, Omar Zakaria, Othman O. Khalifa, Engineering and Technology, Vol.54, ISSN: 2070-3724, P.P
A.A.Zaidan, B.B.Zaidan, Hamdan.O.Alanazi, “Overview: 463-467, June (2009), Paris, France.
Suitability of Using Symmetric Key to Secure Multimedia [24] Ahmed.K.Hasan, A.A.Zaidan, B.B.Zaidan, Anas Majeed,
Rosli Salleh, Omar Zakaria and Ali Zuheir, "Enhancement

 
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 33 
Throughput of Unplanned Wireless Mesh Networks
Deployment Using Partitioning Hierarchical Cluster (PHC) ",
World Academy of Science, Engineering and Technology
(WASET) , International Journal of Science, Engineering and
Technology, Vol.54, ISSN: 2070-3724, P.P 480-484, June
(2009), Paris, France.
[25] Hamid.A.Jalab, A.A Zaidan, B.B Zaidan, “New Design for
Information Hiding with in Steganography Using Distortion
Techniques”, International Journal of Engineering and
Technology (IJET)), Vol 2, No. 1, ISSN: 1793-8236, P.P 72-
77,Feb (2010), Singapore.
[26] Md. Rafiqul Islam, A.W. Naji, A.A.Zaidan, B.B.Zaidan “ New
System for Secure Cover File of Hidden Data in the Image
Page within Executable File Using Statistical Steganography
Techniques”, International Journal of Computer Science and
Information Security (IJCSIS), ISSN: 1947-5500, P.P 273-
279,Vol.7 , NO.1, January 2010, USA.
[27] Hamid.A.Jalab, A.A Zaidan and B.B Zaidan,” Frame Selected
Approach for Hiding Data within MPEG Video Using Bit
Plane Complexity Segmentation”, Journal of Computing
(JOC), Vol.1, Issue 1, ISSN: 2151-9617, P.P 108-113,
December 2009, New York, USA.
 

You might also like