Browse > Article
http://dx.doi.org/10.3837/tiis.2014.06.016

Analysis of Authentication Methods for Smartphone Banking Service using ANP  

Park, Keon Chul (Graduate School of Information, Yonsei University)
Shin, Jae Woo (Graduate School of Information, Yonsei University)
Lee, Bong Gyou (Graduate School of Information, Yonsei University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.6, 2014 , pp. 2087-2103 More about this Journal
Abstract
What is an ideal authentication method for smartphone banking services? And what are the critical elements to be considered when designing it? To provide valuable insight for these questions, this study investigates various authentication requirements to be considered in smartphone banking service with the aspect of security, convenience and cost. By applying Analytic Network Process (ANP), this study first analyzes priorities among the requirements and then draws an ideal authentication method for smartphone banking service. Moreover, a sensitivity analysis has been conducted by varying the relative importance of several requirements. The results from the judgment of 72 experts revealed that, although Korean government has obliged the use of Public Key certificate, OPT and biometric alternatives may prove to be more appropriate for the smartphone banking service. These results will contribute to the provision of more secured and convenient smartphone banking services.
Keywords
Authentication method; Smartphone banking service; Analytic Network Process; ActiveX; Public Key certificate;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 N. Mallat, M. Rossi, and V. Tuunainen, "Mobile Banking Services," Communications of the ACM, vol 47, no. 8, pp. 42-46, 2004.
2 KISA, "Forum for Secured Online Transaction", May. 2010.
3 H. Marko, H. Konstantin, and T. Elena, "Utilizing national public-key infrastructure in mobile payment systems," Electronic Commerce Research and Applications, vol. 7, pp. 214-231, 2008.   DOI   ScienceOn
4 N. H. Kim, "Voice-based OTP Generation Techniques for Mobile Banking," Journal of KIIT, vol. 11, no. 5, pp. 113-119, 2013.
5 S. Yun and H. Lim, "The Biometric based Mobile ID and Its Application to Electronic Voting," TIIS, vol. 7, no. 1, pp.166-183, 2013.   DOI
6 S. Lee, Y. Chung, D. Moon, S. B. Pan and C. Seo, "A Practical Implementation of Fuzzy Fingerprint Vault," TIIS, vol. 5, no. 10, pp. 1783-1798, 2011.
7 Saaty, T.L. Decision Making with Dependence and Feedback: The Analytic Network Process, 2nd Edition, RWS Publications, Pennsylvania, 2001.
8 Saaty, T.L. The Analytic Network Process, RWS Publications, Pennsylvania, 1996.
9 J. H. Lee, "Development of SmartMobile and Information Security," Communications Policy, vol. 22, no. 13, pp. 17-33, 2010.
10 C. S. Weir, G. Douglas, T. Richardson, and M. Jack, "Usable security: User preferences for authentication methods in eBanking and the effects of experience," Interacting with Computers,vol. 22, no. 3, pp. 153-164, 2010.   DOI   ScienceOn
11 National Information Society Agency, National Informatization white paper 2012, National Information Society Agency, Seoul, 2012.
12 G. Kanai, "The Cost of Monoculture," Retrieved from blog, January 29, 2007. http://kanai.net/weblog/archive/2007/01/26/00h53m55s#003095
13 I. Y. Kang, "The problem is not ActiveX but Public Key Certificate," IT Donga, March 25, 2014. http://it.donga.com/17704/
14 B. G. Lee, Y. K. Yeo, K. Y. Kim, and J. H. Lee, "Effect of Trust and Cognitive Absorption on Smartphone Use and User Satisfaction," The KIPS Transations: Part D, vol.16, no. 6, pp.471-480, 2010.
15 Comptroller of Currency, "Internet Banking--Comptroller's Handbook," OCC, Washington, 1999.
16 P. Hanaeek, K. Malinka, and J. Schafer, "e-Banking Security-A Comparative Study," In Proc. of IEEE International Carnahan Conference on Security Technology, pp. 326-330, 2008.
17 T. Laukkanen, "Internet vs. mobile banking: comparing customer value perceptions," Business Process Management Journal, vol. 13, no. 6, pp. 788-797, 2007.   DOI   ScienceOn
18 M. Pura, "Linking perceived value and loyalty in location-based mobile services," Managing Service Quality, vol. 15, no. 6, pp. 509-538, 2005.   DOI   ScienceOn
19 H. Kim, J. H. Huh, and R. Anderson, "On the Security of Internet Banking in South Korea," Oxford University Computing Laboratory, CS-RP-10-01, University of OXFORD, 2010. http://www.cs.ox.ac.uk/publications/publication3442-abstract.html
20 H. J. Lim, H. W. Shim, S. H. Seo, and W. J. Kang, "Authentication Technology Status Analysis of Electronic Financial Transaction Environment," Korea Institutes of Information Security and Cryptology, vol. 18, no. 5, pp. 84-98, 2008.
21 S. C. Hwang, "A study on next generation e-banking Service channel," Information Technology & e-Commerce, vol. 39, pp. 29-54, 2010.
22 T. Dube, T. Chitura, and L. Runyowa, "Adoption and Use of Internet Banking in Zimbabwe: An Exploratory Study," Journal of Internet Banking and Commerce, vol.14, no.1, pp.1-13, 2009.
23 D. Sergios, and K. Nikolaos, "Linking Trust to Use Intention for Technology-Enabled Bank Channels: The Role of Trusting Intentions," Psychology & Marketing, vol. 27, no. 8, pp. 799-820, 2010.   DOI   ScienceOn
24 First Annapolis Consulting, "2012 Mobile Banking and Payment Study," 2012.11
25 Gartner, "Forecast: Mobile Payment, Worldwide, 2009-2016," 2012.5
26 S. M. Lee, "Trends of Authentication and Forecast," Information Technology & e-Commerce, vol.46, pp.31-69, 2011.
27 K. C. Park, S. J. Kim, and B. G. Lee, "Analysis of Security Priorities of u-Learning Environments using ANP," In Proc. of 6th International Conference on Ubiquitous Information Technologies & Applications, Korea, pp. 177-182, 2011.
28 K. Tracy, "Zeus Strikes Mobile Banking," BankInfo Security, Oct. 2010. http://www.bankinfosecurity.com/articles.php?art_id=3005
29 A. Castiglione, R. D. Prisco, and A. De Santis, "Do You Trust Your Phone?," EC-Web 2009, LNCS 5692, pp. 50-61, 2009.
30 McAfee, "Moile security report 2009," 2009. http://www.mcafee.com/us/resources/reports
31 Bank of Korea, "Domestic Internet Banking Service Trends in 2Q. 2013," Aug., 2013.
32 P. Kang, "Status of Public Key Certificate and Policy Direction in Mobile Innovation Era," KIISC review, vol.21 no.1, pp.51-56, 2011.
33 A. Denning, ActiveX Controls Inside Out, 2nd Edition, Microsoft Press, Washington, 1997. http://www.microsoft.com/security/resources/activex-whatis.aspx
34 Ministry of Science, ICT and Future Planning, "2013 Investigation of Web Compatibility," A press release, January 14, 2014.
35 The Federation of Korean Industries, "Survey on ActiveX Usage," A press release, March 24, 2014.