IOT based novel session payment system

  • Authors

    • G. Roja
    • K. Pushpa Rani
    • Ch. Sabitha
    • B. Dhanalaxmi
    • S. Sreeja
    https://doi.org/10.14419/ijet.v7i4.21701

    Received date: November 26, 2018

    Accepted date: November 26, 2018

    Published date: April 16, 2026

  • Abstract

    A remote technique has been intended to process a money related installment effectively. The users can simply use their charge/visas at the counter and all the preparing required should be completed consistently. An advanced mobile phone is a notable device to tolerate. There is an issue of carrying such a significant number of charge/visas in a wallet. Cell phone is the best gadget to convey charge/visas electronically. The present paper gives on an electronic charge/visas in a smart phone and move to IoT cash. A novel session installment framework utilizing IoT cash should be acquainted with limit charge/visas chance. The degree of present paper is confined into the protection appear for a straightforward installment structure utilizing Internet of Things (IoT). Because every IoT cash is uncommon for every installment, here period installment procedure will encourage weight at anchoring the directory of installment structure.

  • References

    1. X. Cui, "The internet of things," in Ethical Ripples of Creativity and Innovation, ed: Springer, 2016, pp.61-68.
    2. R. Ramanathan, "The moderating roles of risk and efficiency on the relationship between logistics performance and customer loyalty in e-commerce," Transportation Research Part E: Logistics and Transpor-tation Review, vol. 46, pp. 950-962, 2010. https://doi.org/10.1016/j.tre.2010.02.002.
    3. A. Z. Hudaib, "Banking and Modern Payments System Security Analysis," International Journal of Computer Science and Security (IJCSS), vol. 8, p. 38, 2014.
    4. D. Miorandi, S. Sicari, F. De Pellegrini, and I.Chlamtac, "Internet of things: Vision, applications and research challenges," Ad Hoc Net-works, vol. 10, pp. 1497-1516, 2012. https://doi.org/10.1016/j.adhoc.2012.02.016.
    5. C. Anchugam and K. Thangadurai, "Classification of Network At-tacks and Countermeasures of Different Attacks," in Network Secu-rity Attacks and Countermeasures, ed: IGI Global, 2016, pp. 115-156.
    6. T. A. Kraft and R. Kakar, "E-commerce security," in Proceedings of the Conference on Information Systems Applied Research, Washing-ton DC, USA, 2009.
    7. J. Ryan, A History of the Internet and the Digital Future: Reaktion Books, 2010.
    8. Y. Lu, L. Zhao, and B. Wang, "From virtual community members to C2C e-commerce buyers: Trust in virtual communities and its effect on consumers’ purchase intention," Electronic Commerce Research and Applications, vol. 9, pp.346-360, 2010. https://doi.org/10.1016/j.elerap.2009.07.003.
    9. M. Niranjanamurthy, N. Kavyashree, S. Jagannath, and D. Chahar, "Analysis of e-commerce and m- commerce: advantages, limitations and security issues," International Journal of Advanced Research in Computer and Communication Engineering, vol.2, 2013.
    10. B. Xiao and I. Benbasat, "E-commerce product recommendation agents: use, characteristics, and impact," MIS quarterly, vol. 31, pp. 137-209, 2007. https://doi.org/10.2307/25148784.
    11. O. Dandash, Y. Wang, P. D. Le, and B. Srinivasan, "Fraudulent In-ternet Banking Payments Prevention using Dynamic Key," JNW, vol. 3, pp. 25-34, 2008. https://doi.org/10.4304/jnw.3.1.25-34.
    12. D. Camps-Mur, A. Garcia-Saavedra, and P. Serrano, "Device-to-device communications with Wi-Fi Direct: overview and experimen-tation," IEEE wireless communications, vol. 20, pp. 96-104, 2013. https://doi.org/10.1109/MWC.2013.6549288.
    13. R. Shahriyar, E. Hoque, S. Sohan, I. Naim, M. M. Akbar, and M. K. Khan, "Remote controlling of home appliances using mobile teleph-ony," International Journal of Smart Home, vol. 2, pp. 37-54, 2008.
    14. M. Jo, T. Maksymyuk, B. Strykhalyuk, and C.-H.Cho, "Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing," IEEE Wireless Communications, vol.22, pp. 50-58, 2015. https://doi.org/10.1109/MWC.2015.7143326.
    15. M. Shiraz, A. Gani, R. H. Khokhar, and R. Buyya, "A review on distributed application processing frameworks in smart mobile devic-es for mobile cloud computing," IEEE Communications Surveys & Tutorials, vol. 15, pp. 1294-1313, 2013. https://doi.org/10.1109/SURV.2012.111412.00045.
    16. S. K. Datta, C. Bonnet, and N. Nikaein, "An IoT gateway centric architecture to provide novel M2M services," in Internet of Things (WF-IoT), 2014 IEEE World Forum on, 2014, pp. 514-519. https://doi.org/10.1109/WF-IoT.2014.6803221.
    17. P. Desai, A. Sheth, and P. Anantharam, "Semantic gateway as a ser-vice architecture for iot interoperability," in Mobile Services (MS), 2015 IEEE International Conference on, 2015, pp. 313-319. https://doi.org/10.1109/MobServ.2015.51.
    18. Ordanini and G. Rubera, "How does the application of an IT service innovation affect firm performance? A theoretical framework and empirical analysis on e-commerce," Information & Management, vol. 47, pp. 60-67, 2010. https://doi.org/10.1016/j.im.2009.10.003.
    19. E. J. Hogan and C. M. Campbell, "Method and system for secure payments over a computer network," ed: Google Patents, 2017.
    20. J. Russell, N. Beitner, O. Dewdney, R. Underwood, and W. Jordan, "E-commerce payment system," ed: Google Patents, 2001.
    21. M. T. Rose, L. H. Stein, N. S. Borenstein, C. M. Lowery, D. New and E. Stefferud, "Computerized payment system for purchasing goods and services on the internet," ed: Google Patents, 1998.
    22. S. Khajuria, L. Sørensen, and K. E. Skouby, Cybersecurity and Pri-vacy-Bridging the Gap: River Publishers, 2017.
    23. C. Kuner, D. J. B. Svantesson, F. H Cate, O. Lynskey, and C. Mil-lard, "The rise of cybersecurity and its impact on data protection," In-ternational Data Privacy Law, vol. 7, pp. 73-75, 2017. https://doi.org/10.1093/idpl/ipx009.
    24. J. B. A. M. J. Clark, A. N. J. A. K. Edward, and W. Felten, "Re-search Perspectives and Challenges for Bitcoin and Cryptocurren-cies."
    25. K. Cao and A. K. Jain, "Hacking mobile phones using 2D Printed Fingerprints," MSU Technical report, MSU-CSE-16-22016.
    26. G. Zhao, X. Si, J. Wang, X. Long, and T. Hu, "A novel mutual au-thentication scheme for Internet of Things," in Modelling, Identifica-tion and Control (ICMIC), Proceedings of 2011 International Con-ference on, 2011, pp. 563-566.
    27. Abdollahi and M. Afzali, "A Single Sign-on based Integrated Model for E-banking Services through Cloud Computing," International Journal, vol. 3, pp. 34-38, 2014.
  • Downloads

  • How to Cite

    Roja, G., Pushpa Rani, K., Sabitha, C., Dhanalaxmi, B., & Sreeja, S. (2026). IOT based novel session payment system. International Journal of Engineering and Technology, 7(4), 3418-3422. https://doi.org/10.14419/ijet.v7i4.21701