This page has only limited features, please log in for full access.
Project Goal: multi-factor security for user identity
Current Stage: Data Collection
Security is beginning to be more and more important for electronic transaction nowadays, and the need for security is becoming more important than ever before. A variety of authentication techniques have been established to ensure the security of electronic transactions. The usage of electronic payment systems has grown significantly in recent years. To secure confidential user details from attacks, the finance sector has begun to implement multi-factor authentication. Multi-factor authentication is a device access management strategy that enables an individual to move through various authentication phases. For each of the previous tasks, attempts have been created to secure the electric payment process by using various authentication methods, and despite the advantages of theirs, each had a downside. Authentication based on password is one of the most common ways for users to authenticate in numerous online transaction applications. Inhere, electronic payments authentication mechanism which mainly relies on the traditional password only authentication cannot efficiently resist to the latest password wondering and password cracking strikes. In order to handle the problem, this paper proposes an authentication algorithm for electric payments by adding a multi-factor mechanism on the existing user authentication mechanism. The enhancement concentrates on enhancing the user authentication elements of multiple factors using the biometric technique. The software is developed using an android simulator, and a platform that helps developers to evaluate an application without the requirement for the device to be built on a real device. The proposed system has two phases, namely: registration stage and an authentication stage. The suggested authentication protocol gives users safe access to the authorization through multi-factor authentication using their password and fingerprint. In order to ensure unauthorized users cannot easily break into the mobile application, the proposed enhancement would provide better security.
Arif Hassan; Zarina Shukur; Mohammad Kamrul Hasan. Enhancing Multi-factor User Authentication for Electronic Payments. Inventive Computation and Information Technologies 2021, 869 -882.
AMA StyleArif Hassan, Zarina Shukur, Mohammad Kamrul Hasan. Enhancing Multi-factor User Authentication for Electronic Payments. Inventive Computation and Information Technologies. 2021; ():869-882.
Chicago/Turabian StyleArif Hassan; Zarina Shukur; Mohammad Kamrul Hasan. 2021. "Enhancing Multi-factor User Authentication for Electronic Payments." Inventive Computation and Information Technologies , no. : 869-882.
Today’s Internet has dramatically reshaped how people make payments and transfer money. Electronic transactions are playing a vital role now in these days to shop, pay bills and money transfer, and many more. Among the electronic payment system nowadays, E-wallet is one of the most famous payment systems. Many countries have already implemented the use of electronic wallets as part of their daily purchase transaction options for their customers. The goal of the study is to recognize the overview study of E-wallet and the features of theirs and to determine the different level of use and learn the best E-wallet and what the reason for practicing. Specifically, the research investigation focuses on Malaysian public university students. To achieve this, we conducted a survey to collect data from 120 participants from the university campus. Statistics were evaluated by using SPSS software and have been documented in this survey. The results show that, among 120 respondents, received 120 valid responses. Among the 120 valid responses, about 101 (84.2%) of them are using the E-wallet payment system. The following respondents who never use e-wallet payment 19 which achieve a rate of 15.8%. The study also reveals that the new financial service has a huge effect on the use of e-wallet among bachelor students. While analyzing gender well the usage of e-wallet, man has larger satisfaction levels and also requires e-wallet often than female students. In addition, students’ perceptions of their perceived use, practice, and reason had a significant impact on their confidence. For practical involvement, the use of E-wallets by most respondents confirms that there is a great potential for this payment spread in Malaysia.
Arif Hassan; Zarina Shukur; Mohammad Kamrul Hasan. Electronic Wallet Payment System in Malaysia. Advances on P2P, Parallel, Grid, Cloud and Internet Computing 2021, 711 -736.
AMA StyleArif Hassan, Zarina Shukur, Mohammad Kamrul Hasan. Electronic Wallet Payment System in Malaysia. Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 2021; ():711-736.
Chicago/Turabian StyleArif Hassan; Zarina Shukur; Mohammad Kamrul Hasan. 2021. "Electronic Wallet Payment System in Malaysia." Advances on P2P, Parallel, Grid, Cloud and Internet Computing , no. : 711-736.
The Industrial Internet of things (IIoT) helps several applications that require power control and low cost to achieve long life. The progress of IIoT communications, mainly based on cognitive radio (CR), has been guided to the robust network connectivity. The low power communication is achieved for IIoT sensors applying the Low Power Wide Area Network (LPWAN) with the Sigfox, NBIoT, and LoRaWAN technologies. This paper aims to review the various technologies and protocols for industrial IoT applications. A depth of assessment has been achieved by comparing various technologies considering the key terms such as frequency, data rate, power, coverage, mobility, costing, and QoS. This paper provides an assessment of 64 articles published on electricity control problems of IIoT between 2007 and 2020. That prepares a qualitative technique of answering the research questions (RQ): RQ1: “How cognitive radio engage with the industrial IoT?”, RQ2: “What are the Proposed architectures that Support Cognitive Radio LPWAN based IIOT?”, and RQ3: What key success factors need to comply for reliable CIIoT support in the industry?”. With the systematic literature assessment approach, the effects displayed on the cognitive radio in LPWAN can significantly revolute the commercial IIoT. Thus, researchers are more focused in this regard. The study suggests that the essential factors of design need to be considered to conquer the critical research gaps of the existing LPWAN cognitive-enabled IIoT. A cognitive low energy architecture is brought to ensure efficient and stable communications in a heterogeneous IIoT. It will protect the network layer from offering the customers an efficient platform to rent AI, and various LPWAN technology were explored and investigated.
Nahla Nurelmadina; Mohammad Hasan; Imran Memon; Rashid Saeed; Khairul Zainol Ariffin; Elmustafa Ali; Rania Mokhtar; Shayla Islam; Eklas Hossain; Arif Hassan. A Systematic Review on Cognitive Radio in Low Power Wide Area Network for Industrial IoT Applications. Sustainability 2021, 13, 338 .
AMA StyleNahla Nurelmadina, Mohammad Hasan, Imran Memon, Rashid Saeed, Khairul Zainol Ariffin, Elmustafa Ali, Rania Mokhtar, Shayla Islam, Eklas Hossain, Arif Hassan. A Systematic Review on Cognitive Radio in Low Power Wide Area Network for Industrial IoT Applications. Sustainability. 2021; 13 (1):338.
Chicago/Turabian StyleNahla Nurelmadina; Mohammad Hasan; Imran Memon; Rashid Saeed; Khairul Zainol Ariffin; Elmustafa Ali; Rania Mokhtar; Shayla Islam; Eklas Hossain; Arif Hassan. 2021. "A Systematic Review on Cognitive Radio in Low Power Wide Area Network for Industrial IoT Applications." Sustainability 13, no. 1: 338.
E-commerce implies an electronic purchasing and marketing process online by using typical Web browsers. As e-commerce is quickly developing on the planet, particularly in recent years, many areas of life are affected, particularly the improvement in how individuals regulate themselves non-financially and financially in different transactions. In electronic payment or e-commerce payment, the gateway is a major component of the structure to assure that such exchanges occur without disputes, while maintaining the common security over such systems. Most Internet payment gateways in e-commerce provide monetary information to customers using trusted third parties directly to a payment gateway. Nonetheless, it is recognized that the cloud Web server is not considered a protected entity. This article aims to develop an efficient and secure electronic payment protocol for e-commerce where consumers can immediately connect with the merchant properly. Interestingly, the proposed system does not require the customer to input his/her identity in the merchant’s website even though the customer can hide his/her identity and make a temporary identity to perform the service. It has been found that our protocol has much improved security effectiveness in terms of confidentiality, integrity, non-repudiation, anonymity availability, authentication, and authorization.
Arif Hassan; Zarina Shukur; Mohammad Kamrul Hasan; Md Arif Hassan. An Efficient Secure Electronic Payment System for E-Commerce. Computers 2020, 9, 66 .
AMA StyleArif Hassan, Zarina Shukur, Mohammad Kamrul Hasan, Md Arif Hassan. An Efficient Secure Electronic Payment System for E-Commerce. Computers. 2020; 9 (3):66.
Chicago/Turabian StyleArif Hassan; Zarina Shukur; Mohammad Kamrul Hasan; Md Arif Hassan. 2020. "An Efficient Secure Electronic Payment System for E-Commerce." Computers 9, no. 3: 66.