Investigation of the NFC technology for mobile payments and the development of a prototype payment application in the context of marginalized rural areas
- Authors: Gurajena, Caroline
- Date: 2014
- Subjects: Mobile commerce -- South Africa Mobile communication systems -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10353/14071 , vital:39802
- Description: The Internet of Things (IoT) environment involves the interaction of numerous ‘things’. These ‘things’ are embedded with different kinds of technologies such as RFID technology, NFC technology and sensors. This causes IoT to bring into play many security risks apart from the ones that already exist in the current Internet, for example, embedded RFID tags can be easily triggered and send their content which could be private information. IoT also introduces internal attacks such as on-off attack, bad mouthing and white washing attacks into networks that already exist. These internal attacks cannot be solved by hard security mechanisms such as cryptographic algorithms and firewalls because they guarantee total trust. This eliminates uncertainty which should always be available where trust exist. That is, hard security mechanisms enable IoT ‘things’ to either trust another ‘thing’ completely or not and this makes them unsuitable for the IoT environment. When objects in any network are communicating, there is some element of uncertainty. Also, hard security mechanisms such as public key cryptography cause communication overheard in the already resource-constrained IoT devices and these conventional cryptography methods cannot deal with internal attacks. This brings about the need for a middleware that includes functions that will manage trust, privacy and security issues of all data exchange, communications and network connections. For IoT to be successful, the provision of trust, security and privacy measures are essential. Trust management may enhance the adoption and security measures in IoT. Trust helps in identifying trustworthy ‘things’ in the network and give ‘things’ in the network the ability to reason in all aspects concerning trust in the environment. Trust can be administered through a trust management model. This research notes that most of the trust models that have been proposed fail to address scalability challenges and lack suitable computation methods. It is on that premise that this research focuses on developing a suitable trust model for the IoT environment. The research also introduces new ways of creating relationships in IoT. This enables the creation of new cooperation opportunities in the environment. In overall, this research aimed to design and develop a generic trust and authority delegation model for the heterogonous IoT environment that is scalable and generalized to cater for the heterogeneous IoT environment. This research was conducted in three phases. The first phase reviewed literature in order to identify outstanding issues in IoT trust management and also identify the suitable computational method. This provided a critical analysis of different computational methods highlighting their advantages and limitations. In the second phase of the research, the proposed trust model was designed and tested. In the last phase, the feasibility of the proposed model was evaluated. The proposed model is based on fuzzy logic. Fuzzy logic was selected for trust computation because it is able to imitate the process of the human mind through the use of linguistic variables and it can handle uncertainty. The proposed model was tested in a simulated environment. The simulation results showed that the proposed model can identify selfish and malicious entities effectively. The results also showed that the model was able to deal with different types of behaviours of entities. The testing proved that the proposed trust model can support decision making in IoT based on trust. The results from the evaluation show that this research ameliorates the design and development of trust management solutions for the IoT environment.
- Full Text:
- Date Issued: 2014
- Authors: Gurajena, Caroline
- Date: 2014
- Subjects: Mobile commerce -- South Africa Mobile communication systems -- South Africa
- Language: English
- Type: Thesis , Doctoral , DPhil
- Identifier: http://hdl.handle.net/10353/14071 , vital:39802
- Description: The Internet of Things (IoT) environment involves the interaction of numerous ‘things’. These ‘things’ are embedded with different kinds of technologies such as RFID technology, NFC technology and sensors. This causes IoT to bring into play many security risks apart from the ones that already exist in the current Internet, for example, embedded RFID tags can be easily triggered and send their content which could be private information. IoT also introduces internal attacks such as on-off attack, bad mouthing and white washing attacks into networks that already exist. These internal attacks cannot be solved by hard security mechanisms such as cryptographic algorithms and firewalls because they guarantee total trust. This eliminates uncertainty which should always be available where trust exist. That is, hard security mechanisms enable IoT ‘things’ to either trust another ‘thing’ completely or not and this makes them unsuitable for the IoT environment. When objects in any network are communicating, there is some element of uncertainty. Also, hard security mechanisms such as public key cryptography cause communication overheard in the already resource-constrained IoT devices and these conventional cryptography methods cannot deal with internal attacks. This brings about the need for a middleware that includes functions that will manage trust, privacy and security issues of all data exchange, communications and network connections. For IoT to be successful, the provision of trust, security and privacy measures are essential. Trust management may enhance the adoption and security measures in IoT. Trust helps in identifying trustworthy ‘things’ in the network and give ‘things’ in the network the ability to reason in all aspects concerning trust in the environment. Trust can be administered through a trust management model. This research notes that most of the trust models that have been proposed fail to address scalability challenges and lack suitable computation methods. It is on that premise that this research focuses on developing a suitable trust model for the IoT environment. The research also introduces new ways of creating relationships in IoT. This enables the creation of new cooperation opportunities in the environment. In overall, this research aimed to design and develop a generic trust and authority delegation model for the heterogonous IoT environment that is scalable and generalized to cater for the heterogeneous IoT environment. This research was conducted in three phases. The first phase reviewed literature in order to identify outstanding issues in IoT trust management and also identify the suitable computational method. This provided a critical analysis of different computational methods highlighting their advantages and limitations. In the second phase of the research, the proposed trust model was designed and tested. In the last phase, the feasibility of the proposed model was evaluated. The proposed model is based on fuzzy logic. Fuzzy logic was selected for trust computation because it is able to imitate the process of the human mind through the use of linguistic variables and it can handle uncertainty. The proposed model was tested in a simulated environment. The simulation results showed that the proposed model can identify selfish and malicious entities effectively. The results also showed that the model was able to deal with different types of behaviours of entities. The testing proved that the proposed trust model can support decision making in IoT based on trust. The results from the evaluation show that this research ameliorates the design and development of trust management solutions for the IoT environment.
- Full Text:
- Date Issued: 2014
Investigation of the NFC technology for mobile payments and the development of a prototype payment application in the context of marginalized rural areas
- Authors: Gurajena, Caroline
- Date: 2014
- Language: English
- Type: Thesis , Masters , MSc (Computer Science)
- Identifier: vital:11401 , http://hdl.handle.net/10353/d1020243
- Description: Both communication, and the methods and tools of commerce have evolved over time through the invention of new technologies. The latest of these technologies are mobile devices and electronic commerce respectively. The combination of these two technologies has resulted in the creation of electronic commerce which also enables mobile payments. Mobile payments (mpayments) are enabled by many technologies with Near Field Communication (NFC) being the most recent one. NFC is a wireless technology that enables mobile devices in close proximity to exchange data. The mobile device has already been enthusiastically accepted by the customers and they carry it with them wherever they go and this makes it a good device for providing a payment method alternative. This research looks at contactless mobile payment as a payment method. Customers in marginalized rural areas lack a payment alternative to cash hence in this research we are investigating and proposing the use of a NFC enabled mobile payment application for Marginalized Rural Areas. This research extensively evaluates and assesses the potential of using NFC enabled m-payments in Marginalized Rural Areas in South Africa by carrying out an investigation of the technology and its acceptance by customers. The investigation of the technology included implementation of a prototype application which was used to introduce the technology to the consumers. The customer acceptance of the NFC enabled mobile payments was evaluated using the Technology Acceptance model (TAM). The model was modified to suit the context of this study by adding more constructs. This research concluded that Near Field Communication enabled m-payments have great potential to be used and accepted by people in the marginalized rural areas.
- Full Text:
- Date Issued: 2014
- Authors: Gurajena, Caroline
- Date: 2014
- Language: English
- Type: Thesis , Masters , MSc (Computer Science)
- Identifier: vital:11401 , http://hdl.handle.net/10353/d1020243
- Description: Both communication, and the methods and tools of commerce have evolved over time through the invention of new technologies. The latest of these technologies are mobile devices and electronic commerce respectively. The combination of these two technologies has resulted in the creation of electronic commerce which also enables mobile payments. Mobile payments (mpayments) are enabled by many technologies with Near Field Communication (NFC) being the most recent one. NFC is a wireless technology that enables mobile devices in close proximity to exchange data. The mobile device has already been enthusiastically accepted by the customers and they carry it with them wherever they go and this makes it a good device for providing a payment method alternative. This research looks at contactless mobile payment as a payment method. Customers in marginalized rural areas lack a payment alternative to cash hence in this research we are investigating and proposing the use of a NFC enabled mobile payment application for Marginalized Rural Areas. This research extensively evaluates and assesses the potential of using NFC enabled m-payments in Marginalized Rural Areas in South Africa by carrying out an investigation of the technology and its acceptance by customers. The investigation of the technology included implementation of a prototype application which was used to introduce the technology to the consumers. The customer acceptance of the NFC enabled mobile payments was evaluated using the Technology Acceptance model (TAM). The model was modified to suit the context of this study by adding more constructs. This research concluded that Near Field Communication enabled m-payments have great potential to be used and accepted by people in the marginalized rural areas.
- Full Text:
- Date Issued: 2014
- «
- ‹
- 1
- ›
- »