IOT based novel session payment system

  • Authors

    • G. Roja
    • K. Pushpa Rani
    • Ch. Sabitha
    • B. Dhanalaxmi
    • S. Sreeja
    https://doi.org/10.14419/ijet.v7i4.21701
  • A remote technique has been intended to process a money related installment effectively. The users can simply use their charge/visas at the counter and all the preparing required should be completed consistently. An advanced mobile phone is a notable device to tolerate. There is an issue of carrying such a significant number of charge/visas in a wallet. Cell phone is the best gadget to convey charge/visas electronically. The present paper gives on an electronic charge/visas in a smart phone and move to IoT cash. A novel session installment framework utilizing IoT cash should be acquainted with limit charge/visas chance. The degree of present paper is confined into the protection appear for a straightforward installment structure utilizing Internet of Things (IoT). Because every IoT cash is uncommon for every installment, here period installment procedure will encourage weight at anchoring the directory of installment structure.

  • References

    1. [1] X. Cui, "The internet of things," in Ethical Ripples of Creativity and Innovation, ed: Springer, 2016, pp.61-68.

      [2] R. Ramanathan, "The moderating roles of risk and efficiency on the relationship between logistics performance and customer loyalty in e-commerce," Transportation Research Part E: Logistics and Transportation Review, vol. 46, pp. 950-962, 2010. https://doi.org/10.1016/j.tre.2010.02.002.

      [3] A. Z. Hudaib, "Banking and Modern Payments System Security Analysis," International Journal of Computer Science and Security (IJCSS), vol. 8, p. 38, 2014.

      [4] D. Miorandi, S. Sicari, F. De Pellegrini, and I.Chlamtac, "Internet of things: Vision, applications and research challenges," Ad Hoc Networks, vol. 10, pp. 1497-1516, 2012. https://doi.org/10.1016/j.adhoc.2012.02.016.

      [5] C. Anchugam and K. Thangadurai, "Classification of Network Attacks and Countermeasures of Different Attacks," in Network Security Attacks and Countermeasures, ed: IGI Global, 2016, pp. 115-156.

      [6] T. A. Kraft and R. Kakar, "E-commerce security," in Proceedings of the Conference on Information Systems Applied Research, Washington DC, USA, 2009.

      [7] J. Ryan, A History of the Internet and the Digital Future: Reaktion Books, 2010.

      [8] Y. Lu, L. Zhao, and B. Wang, "From virtual community members to C2C e-commerce buyers: Trust in virtual communities and its effect on consumers’ purchase intention," Electronic Commerce Research and Applications, vol. 9, pp.346-360, 2010. https://doi.org/10.1016/j.elerap.2009.07.003.

      [9] M. Niranjanamurthy, N. Kavyashree, S. Jagannath, and D. Chahar, "Analysis of e-commerce and m- commerce: advantages, limitations and security issues," International Journal of Advanced Research in Computer and Communication Engineering, vol.2, 2013.

      [10] B. Xiao and I. Benbasat, "E-commerce product recommendation agents: use, characteristics, and impact," MIS quarterly, vol. 31, pp. 137-209, 2007. https://doi.org/10.2307/25148784.

      [11] O. Dandash, Y. Wang, P. D. Le, and B. Srinivasan, "Fraudulent Internet Banking Payments Prevention using Dynamic Key," JNW, vol. 3, pp. 25-34, 2008. https://doi.org/10.4304/jnw.3.1.25-34.

      [12] D. Camps-Mur, A. Garcia-Saavedra, and P. Serrano, "Device-to-device communications with Wi-Fi Direct: overview and experimentation," IEEE wireless communications, vol. 20, pp. 96-104, 2013. https://doi.org/10.1109/MWC.2013.6549288.

      [13] R. Shahriyar, E. Hoque, S. Sohan, I. Naim, M. M. Akbar, and M. K. Khan, "Remote controlling of home appliances using mobile telephony," International Journal of Smart Home, vol. 2, pp. 37-54, 2008.

      [14] M. Jo, T. Maksymyuk, B. Strykhalyuk, and C.-H.Cho, "Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing," IEEE Wireless Communications, vol.22, pp. 50-58, 2015. https://doi.org/10.1109/MWC.2015.7143326.

      [15] M. Shiraz, A. Gani, R. H. Khokhar, and R. Buyya, "A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing," IEEE Communications Surveys & Tutorials, vol. 15, pp. 1294-1313, 2013. https://doi.org/10.1109/SURV.2012.111412.00045.

      [16] S. K. Datta, C. Bonnet, and N. Nikaein, "An IoT gateway centric architecture to provide novel M2M services," in Internet of Things (WF-IoT), 2014 IEEE World Forum on, 2014, pp. 514-519. https://doi.org/10.1109/WF-IoT.2014.6803221.

      [17] P. Desai, A. Sheth, and P. Anantharam, "Semantic gateway as a service architecture for iot interoperability," in Mobile Services (MS), 2015 IEEE International Conference on, 2015, pp. 313-319. https://doi.org/10.1109/MobServ.2015.51.

      [18] Ordanini and G. Rubera, "How does the application of an IT service innovation affect firm performance? A theoretical framework and empirical analysis on e-commerce," Information & Management, vol. 47, pp. 60-67, 2010. https://doi.org/10.1016/j.im.2009.10.003.

      [19] E. J. Hogan and C. M. Campbell, "Method and system for secure payments over a computer network," ed: Google Patents, 2017.

      [20] J. Russell, N. Beitner, O. Dewdney, R. Underwood, and W. Jordan, "E-commerce payment system," ed: Google Patents, 2001.

      [21] M. T. Rose, L. H. Stein, N. S. Borenstein, C. M. Lowery, D. New and E. Stefferud, "Computerized payment system for purchasing goods and services on the internet," ed: Google Patents, 1998.

      [22] S. Khajuria, L. Sørensen, and K. E. Skouby, Cybersecurity and Privacy-Bridging the Gap: River Publishers, 2017.

      [23] C. Kuner, D. J. B. Svantesson, F. H Cate, O. Lynskey, and C. Millard, "The rise of cybersecurity and its impact on data protection," International Data Privacy Law, vol. 7, pp. 73-75, 2017. https://doi.org/10.1093/idpl/ipx009.

      [24] J. B. A. M. J. Clark, A. N. J. A. K. Edward, and W. Felten, "Research Perspectives and Challenges for Bitcoin and Cryptocurrencies."

      [25] K. Cao and A. K. Jain, "Hacking mobile phones using 2D Printed Fingerprints," MSU Technical report, MSU-CSE-16-22016.

      [26] G. Zhao, X. Si, J. Wang, X. Long, and T. Hu, "A novel mutual authentication scheme for Internet of Things," in Modelling, Identification and Control (ICMIC), Proceedings of 2011 International Conference on, 2011, pp. 563-566.

      [27] Abdollahi and M. Afzali, "A Single Sign-on based Integrated Model for E-banking Services through Cloud Computing," International Journal, vol. 3, pp. 34-38, 2014.

  • Downloads

  • How to Cite

    Roja, G., Pushpa Rani, K., Sabitha, C., Dhanalaxmi, B., & Sreeja, S. (2018). IOT based novel session payment system. International Journal of Engineering & Technology, 7(4), 3418-3422. https://doi.org/10.14419/ijet.v7i4.21701