A review of security mechanisms in electronic payment systems
Article Sidebar
Issue Vol. 38 (2026)
-
Comparative analysis of Next.js and Astro frameworks
Patryk Gieda, Marek Miłosz1-5
-
Behavioral analysis of ransomware threats to ESXi Hypervisors: a machine learning-based predictive model
Upakar Bhatta6-10
-
Performance and usability evaluation of a VR virtual museum application
Kamil Gabrysiewicz, Krzysztof Dziedzic11-18
-
Comparative analysis of selected data visualization methods
Damian Węcławski, Radosław Tomczyk, Paweł Powroźnik19-25
-
A performance comparison of web programming interfaces: GraphQL, gRPC and Thrift
Piotr Rożek, Mariusz Dzieńkowski26-31
-
A review of security mechanisms in electronic payment systems
Omniah ALibrahim, Suhair Alshehri32-42
-
Clustering methods in machine learning
Bartłomiej Głuszczak, Paweł Powroźnik43-50
-
Comparative analysis of interpretable artificial intelligence methods
Aleksandra Kuszewska, Małgorzata Charytanowicz51-58
-
Comparative analysis of machine learning classifiers
Łukasz Krukowski, Grzegorz Kozieł59-65
-
Analysis of the impact of machine learning algorithms on the quality of generated sounds
Krzysztof Pedrycz, Mateusz Pikula66-72
-
Comparative analysis of the functionalities of applications supporting the self-control process of anticoagulation therapy
Marcin Furmaga, Vitalii Baida73-80
-
Application of machine learning for predicting Formula 1 race results
Sylwia Krzysztoń, Jakub Smołka81-86
-
Analysis of latency reduction and performance improvement methods in selected VR applications
Mateusz Czapczyński, Krzysztof Dziedzic87-94
-
Integrating deep learning image analysis into Web GIS applications: A Hybrid Flask - Spring Boot architecture for automated place detection
Medjon HYSENAJ95-101
Main Article Content
DOI
Sustainable Development Goals (SDG)
- Decent work and economic growth
- Industry, Innovation, Technology and Infrastructure
- Reduced inequality
Authors
omohammedtaiebalibrahim@stu.ka
Abstract
Over the last decade, advances in information technology have driven e-commerce and e-payment, enabling global transactions anytime. While offering convenience, these systems raise concerns because fraud, identity theft, and unauthorized payments continue to grow. This paper examines e-payment security, focusing on transaction and protocol vulnerabilities in encryption, authentication, and data integrity, and explores cryptography, authentication mechanisms, and novel architectures. It stresses balancing security and ease of use. Though newer encryption methods and blockchain enhance security, overhead and scalability remain issues. Secure digital transactions require multi-dimensional architectures that integrate authentication, privacy, integrity, non-repudiation, and traditional cryptography with modern technology.
Keywords:
References
[1] S. F. Verkijika, An effective response model for understanding the acceptance of mobile payment systems, Electronic Commerce Research and Applications 39 (2020) 100905, https://doi.org/10.1016/j.elerap.2019.100905. DOI: https://doi.org/10.1016/j.elerap.2019.100905
[2] M. Baza, N. Lasla, M. M. Mahmoud, G. Srivastava, M. Abdallah, B-ride: Ride sharing with privacy-preservation, trust and fair payment atop public blockchain, IEEE Transactions on Network Science and Engineering 8 (2) (2019) 1214–1229, https://doi.org/10.1109/TNSE.2019.2959230. DOI: https://doi.org/10.1109/TNSE.2019.2959230
[3] R. M. Mohammad, H. Y. AbuMansour, An intelligent model for trustworthiness evaluation in semantic web applications, In 2017 8th international conference on information and communication systems (ICICS), IEEE (2017) 362–367, https://doi.org/10.1109/IACS.2017.7921999. DOI: https://doi.org/10.1109/IACS.2017.7921999
[4] C. Thammarat, W. Kurutach, A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification, International Journal of Communication Systems 32 (12) (2019) e3991, https://doi.org/10.1002/dac.3991. DOI: https://doi.org/10.1002/dac.3991
[5] R. L. Rivest, A. Shamir, PayWord and MicroMint: Two simple micropayment schemes, in International workshop on security protocols, Springer (1996) 69–87, https://doi.org/10.1007/3-540-62494-5_6. DOI: https://doi.org/10.1007/3-540-62494-5_6
[6] M. Farion, A. Farion, Security of Mobile Payments and Digital Wallets, https://dspace.wunu.edu.ua/bitstream/316497/37537/1/SECURITY%20OF%20MOBILE%20PAYMENTS%20AND%20DIGITAL%20WALLETS%2019.docx, [accessed 11.11.2025].
[7] W. Ahmed, A. Rasool, A. Javed, N. Kumar, T. Gadekallu, Z. Jalil, Security in next generation mobile payment systems: A comprehensive survey, IEEE Access 9 (2021) 115932–115950, https://doi.org/10.1109/ACCESS.2021.3105450. DOI: https://doi.org/10.1109/ACCESS.2021.3105450
[8] S. Mitra, B. Jana, J. Poray, Implementation of a novel security technique using triple des in cashless transaction, In 2017 international conference on computer, electrical & communication engineering (ICCECE), IEEE (2017) 1–6, https://doi.org/10.1109/ICCECE.2017.8526233. DOI: https://doi.org/10.1109/ICCECE.2017.8526233
[9] B. U. I. Khan, R. F. Olanrewaju, A. M. Baba, A. A. Langoo, S. Assad, A compendious study of online payment systems: Past developments, present impact, and future considerations, International journal of advanced computer science and applications 8 (5) (2017) 256-271, http://dx.doi.org/10.14569/IJACSA.2017.080532. DOI: https://doi.org/10.14569/IJACSA.2017.080532
[10] K. AL-Qawasmi, M. AL-Mousa, M. Yousef, Proposed e-payment process model to enhance quality of service through maintaining the trust of availability, arXiv preprint arXiv:2101.01399 (2021), https://doi.org/10.48550/arXiv.2101.01399. DOI: https://doi.org/10.30534/ijeter/2020/16862020
[11] Z. Hasan, C. Agrawal, M. Agrawal, online transaction security enhancement: An algorithm based on cryptography, In 2019 international conference on issues and challenges in intelligent computing techniques (ICICT), IEEE (2019) 1–4, https://doi.org/10.1109/ICICT46931.2019.8977669. DOI: https://doi.org/10.1109/ICICT46931.2019.8977669
[12] H. Kader, M. Hadhoud, Performance evaluation of symmetric encryption algorithms, International Journal of Computer Science and Network Security 8 (12) (2008) 280–286.
[13] K.-H. Yeh, A secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments, IEEE Systems Journal 12 (2) (2017) 2027–2038, https://doi.org/10.1109/JSYST.2017.2668389. DOI: https://doi.org/10.1109/JSYST.2017.2668389
[14] K.-H. Yeh, C. Su, J.-L. Hou, W. Chiu, C.-M. Chen, A robust mobile payment scheme with smart contract-based transaction repository, IEEE Access 6 (2018) 59394–59404, https://doi.org/10.1109/ACCESS.2018.2874021. DOI: https://doi.org/10.1109/ACCESS.2018.2874021
[15] P. K. Singh, P. Tripathi, R. Kumar, D. Kumar, Secure data transmission, International Research Journal of Engineering and Technology 4 (4) (2017) 217–222.
[16] L. Xu, Secure transmission strategy of network communication layer relay based on satellite transmission, In 2020 2nd international conference on information technology and computer application (ITCA), IEEE (2020) 268–271, https://doi.org/10.1109/ITCA52113.2020.00064. DOI: https://doi.org/10.1109/ITCA52113.2020.00064
[17] G. Muneeswari, A. Puthussery, Multilevel security and dual OTP system for online transaction against attacks, In 2019 third international conference on i-SMAC (IoT in social, mobile, analytics and cloud) (i-SMAC), IEEE (2019) 221–225, https://doi.org/10.1109/I-SMAC47947.2019.9032466. DOI: https://doi.org/10.1109/I-SMAC47947.2019.9032466
[18] S. E. Cebeci, K. Nari, E. Ozdemir, Secure e-commerce scheme, IEEE Access 10 (2022) 10359–10370, https://doi.org/10.1109/ACCESS.2022.3145030. DOI: https://doi.org/10.1109/ACCESS.2022.3145030
[19] Y. Liu, W. Huang, M. Zhuo, S. Zhou, M. Li, Mobile payment protocol with deniably authenticated property, Sensors 23 (8) (2023) 3927, https://doi.org/10.3390/s23083927. DOI: https://doi.org/10.3390/s23083927
[20] C. Thammarat, C. Techapanupreeda, A secure mobile payment protocol for handling accountability with formal verification, In 2021 international conference on information networking (ICOIN), IEEE (2021) 249–254, https://doi.org/10.1109/ICOIN50884.2021.9333957. DOI: https://doi.org/10.1109/ICOIN50884.2021.9333957
[21] C.-M. Yu, X. Jin, A. Feng, Secure e-commerce payment system based on novel SET network protocols, Journal of Network Intelligence 9 (2) (2024) 881-895.
[22] M. Obaid, Z. Bayram, M. Saleh, Instant secure mobile payment scheme, IEEE Access 7 (2019) 55669–55678, https://doi.org/10.1109/ACCESS.2019.2913430. DOI: https://doi.org/10.1109/ACCESS.2019.2913430
[23] J. Neera, X. Chen, N. Aslam, B. Issac, A trustworthy and untraceable centralised payment protocol for mobile payment, ACM Transactions on Privacy and Security, 28 (2) (2025) 1-29, https://doi.org/10.1145/3706421. DOI: https://doi.org/10.1145/3706421
[24] C. Thammarat, Efficient, secure NFC authentication for mobile payment ensuring fair exchange protocol, Symmetry 12 (10) (2020) 1649, https://doi.org/10.3390/sym12101649. DOI: https://doi.org/10.3390/sym12101649
[25] R. A. Abouhogail, A. H. Ali, Design and development of an advanced authentication protocol for mobile applications using NFC technology, Journal of Computer Science 15 (12) (2019) 1809–1819, https://doi.org/10.3844/jcssp.2019.1809.1819. DOI: https://doi.org/10.3844/jcssp.2019.1809.1819
[26] F. S. M. Tafti, S. Mohammadi, M. Babagoli, A new NFC mobile payment protocol using improved GSM based authentication, Journal of Information Security and Applications 62 (2021) 102997, https://doi.org/10.1016/j.jisa.2021.102997. DOI: https://doi.org/10.1016/j.jisa.2021.102997
[27] S. S. Ahamad, A novel NFC-based secure protocol for merchant transactions, IEEE Access 10 (2021) 1905–1920, https://doi.org/10.1109/ACCESS.2021.3139065. DOI: https://doi.org/10.1109/ACCESS.2021.3139065
[28] E. N. C. Granja, Developing a Next-Generation Tokenization Framework to Secure Digital Payments, https://www.authorea.com/users/824284/articles/1221046-developing-a-next-generation-tokenization-framework-to-secure-digital-payments, [accessed 11.11.2025]. DOI: https://doi.org/10.22541/au.172538393.36628865/v1
Article Details
Abstract views: 5

