An In-Depth Analysis of & Performance Comparison Security Models Used In Banking Scenario
Keywords:
Security Models, Banking Scenarios, Comparative Analysis, Precision, Accuracy, Complexity, Deployment Cost, Scalability, Empirical Study, ParadigmsAbstract
The demands of the contemporary banking environment call for a sharp focus on security paradigms that protect the integrity and confidentiality of private financial information. The exposure to several cyber dangers increases as digitization quickens and transactions cross traditional boundaries. This study conducts a thorough examination of security models within the context of banking situations in response to this urgent requirement, attempting to shed light on their intricacies and efficacies through a discriminating comparative analysis. The complexity of cyber threats, which is increasing, necessitates security frameworks that go beyond conventional safeguards, which forms the basis of this work. In order to prevent breaches, safeguard customer data, and guarantee smooth operations, banking institutions must carefully consider and select the best security models. This paper examines the complexities of security models while closely examining their applicability and performance metrics in light of these imperatives. The review procedure used here combines in-depth literature analysis with empirical evaluation. The initial stage entails a thorough analysis of the security paradigms currently in use in banking situations. The fabric of these models is made up of multifactor authentication methods, intrusion detection systems, access control mechanisms, and cryptographic techniques. This thorough evaluation lays the groundwork for the comparative study that follows, which depends on crucial parameters including precision, accuracy, complexity, deployment cost, and scalability levels. The report carefully examines the interplay of evaluative criteria and analyses the strengths and weaknesses of each security model. This approach concludes with a sharp evaluation that highlights the differences in their abilities to fend off cyberthreats and survive the rigours of the banking environment. The abstract ends by stating that our work proves not just the necessity of sophisticated security models but also gives stakeholders, decision-makers, and practitioners a useful tool for wise model selections.
References
- M. Hajiabbasi, E. Akhtarkavan and B. Majidi, "Cyber-Physical Customer Management for Internet of Robotic Things-Enabled Banking," in IEEE Access, vol. 11, pp. 34062-34079, 2023, doi: 10.1109/ACCESS.2023.3263859.
- L. Xue, D. Liu, J. Ni, X. Lin and X. S. Shen, "Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Payment," in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 2, pp. 931-943, 1 March-April 2023, doi: 10.1109/TDSC.2022.3144991.
- X. Yang, Z. Wang and C. Wang, "Cryptanalysis of a Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments," in IEEE Systems Journal, vol. 17, no. 1, pp. 601-604, March 2023, doi: 10.1109/JSYST.2022.3171258.
- C. Bai, Q. Han, G. Mezzour, F. Pierazzi and V. S. Subrahmanian, "$\sf {DBank}$DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans," in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1378-1393, 1 May-June 2021, doi: 10.1109/TDSC.2019.2909902.
- M. M. Islam, M. K. Islam, M. Shahjalal, M. Z. Chowdhury and Y. M. Jang, "A Low-Cost Cross-Border Payment System Based on Auditable Cryptocurrency With Consortium Blockchain: Joint Digital Currency," in IEEE Transactions on Services Computing, vol. 16, no. 3, pp. 1616-1629, 1 May-June 2023, doi: 10.1109/TSC.2022.3207224.
- Z. Qiao, Q. Yang, Y. Zhou and M. Zhang, "Improved Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments," in IEEE Systems Journal, vol. 16, no. 2, pp. 1842-1850, June 2022, doi: 10.1109/JSYST.2020.3046450.
- C. Wang, C. Wang, H. Zhu and J. Cui, "LAW: Learning Automatic Windows for Online Payment Fraud Detection," in IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 5, pp. 2122-2135, 1 Sept.-Oct. 2021, doi: 10.1109/TDSC.2020.3037784.
- S. S. Ahamad, "A Novel NFC-Based Secure Protocol for Merchant Transactions," in IEEE Access, vol. 10, pp. 1905-1920, 2022, doi: 10.1109/ACCESS.2021.3139065.
- N. Ivanov and Q. Yan, "AutoThing: A Secure Transaction Framework for Self-Service Things," in IEEE Transactions on Services Computing, vol. 16, no. 2, pp. 983-995, 1 March-April 2023, doi: 10.1109/TSC.2022.3185114.
- L. Fang et al., "A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 5, pp. 3564-3578, 1 Sept.-Oct. 2022, doi: 10.1109/TDSC.2021.3102099.
- C. Wang, S. Chai, H. Zhu and C. Jiang, "CAeSaR: An Online Payment Anti-Fraud Integration System With Decision Explainability," in IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 3, pp. 2565-2577, 1 May-June 2023, doi: 10.1109/TDSC.2022.3186733.
- C. Wang and H. Zhu, "Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services," in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 1, pp. 301-315, 1 Jan.-Feb. 2022, doi: 10.1109/TDSC.2020.2991872.
- R. Elnaggar, S. Chen, P. Song and K. Chakrabarty, "Securing SoCs With FPGAs Against Rowhammer Attacks," in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 41, no. 7, pp. 2052-2065, July 2022, doi: 10.1109/TCAD.2021.3102004.
- J. Choi, C. -W. Wong, H. Su and M. Wu, "Analysis of ENF Signal Extraction From Videos Acquired by Rolling Shutters," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4229-4242, 2023, doi: 10.1109/TIFS.2023.3287132.
- Q. Wang and D. Wang, "Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 597-612, 2023, doi: 10.1109/TIFS.2022.3227753.
- I. M. Ibrahim, M. G. M. Mostafa, S. H. N. El-Din, R. Elgohary and H. Faheem, "A Robust Generic Multi-Authority Attributes Management System for Cloud Storage Services," in IEEE Transactions on Cloud Computing, vol. 9, no. 2, pp. 435-446, 1 April-June 2021, doi: 10.1109/TCC.2018.2867871.
- W. Cheng, S. Guilley and J. -L. Danger, "Information Leakage in Code-Based Masking: A Systematic Evaluation by Higher-Order Attacks," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1624-1638, 2022, doi: 10.1109/TIFS.2022.3167914.
- K. Nagarajan, F. U. Ahmed, M. N. I. Khan, A. De, M. H. Chowdhury and S. Ghosh, "SecNVM: Power Side-Channel Elimination Using On-Chip Capacitors for Highly Secure Emerging NVM," in IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 29, no. 8, pp. 1518-1528, Aug. 2021, doi: 10.1109/TVLSI.2021.3087734.
- A. E. R. Rincón, W. S. Melo, C. M. de Farias and L. F. R. C. Carmo, "Securing Smart Meters Through Physical Properties of Their Components," in IEEE Transactions on Instrumentation and Measurement, vol. 70, pp. 1-11, 2021, Art no. 3000511, doi: 10.1109/TIM.2020.3041098.
- A. Sedik et al., "Deep Learning Modalities for Biometric Alteration Detection in 5G Networks-Based Secure Smart Cities," in IEEE Access, vol. 9, pp. 94780-94788, 2021, doi: 10.1109/ACCESS.2021.3088341.
- J. Ni, M. H. Au, W. Wu, X. Luo, X. Lin and X. S. Shen, "Dual-Anonymous Off-Line Electronic Cash for Mobile Payment," in IEEE Transactions on Mobile Computing, vol. 22, no. 6, pp. 3303-3317, 1 June 2023, doi: 10.1109/TMC.2021.3135301.
- J. Sun, Y. Yuan, M. Tang, X. Cheng, X. Nie and M. U. Aftab, "Privacy-Preserving Bilateral Fine-Grained Access Control for Cloud-Enabled Industrial IoT Healthcare," in IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6483-6493, Sept. 2022, doi: 10.1109/TII.2021.3133345.
- F. Ali, S. Sarwar, Q. M. Shafi, M. Iqbal, M. Safyan and Z. U. Qayyum, "Securing IoT Based Maritime Transportation System Through Entropy-Based Dual-Stack Machine Learning Framework," in IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 2482-2491, Feb. 2023, doi: 10.1109/TITS.2022.3177772.
- K. Yang, L. Chen, Z. Zhang, C. J. P. Newton, B. Yang and L. Xi, "Direct Anonymous Attestation With Optimal TPM Signing Efficiency," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2260-2275, 2021, doi: 10.1109/TIFS.2021.3051801.
- Y. Zhou, K. G. Vamvoudakis, W. M. Haddad and Z. -P. Jiang, "A Secure Control Learning Framework for Cyber-Physical Systems Under Sensor and Actuator Attacks," in IEEE Transactions on Cybernetics, vol. 51, no. 9, pp. 4648-4660, Sept. 2021, doi: 10.1109/TCYB.2020.3006871.
- Shivadekar, S., Kataria, B., Limkar, S. et al. Design of an efficient multimodal engine for preemption and post-treatment recommendations for skin diseases via a deep learning-based hybrid bioinspired process. Soft Comput (2023).
- Shivadekar, Samit, et al. "Deep Learning Based Image Classification of Lungs Radiography for Detecting COVID-19 using a Deep CNN and ResNet 50." International Journal of Intelligent Systems and Applications in Engineering 11.1s (2023): 241-250.
- P. Nguyen, S. Shivadekar, S. S. Laya Chukkapalli and M. Halem, "Satellite Data Fusion of Multiple Observed XCO2 using Compressive Sensing and Deep Learning," IGARSS 2020 - 2020 IEEE International Geoscience and Remote Sensing Symposium, Waikoloa, HI, USA, 2020, pp. 2073-2076, doi: 10.1109/IGARSS39084.2020.9323861.
- Banait, Satish S., et al. "Reinforcement mSVM: An Efficient Clustering and Classification Approach using reinforcement and supervised Techniques." International Journal of Intelligent Systems and Applications in Engineering 10.1s (2022): 78-89.
- Shewale, Yogita, Shailesh Kumar, and Satish Banait. "Machine Learning Based Intrusion Detection in IoT Network Using MLP and LSTM." International Journal of Intelligent Systems and Applications in Engineering 11.7s (2023): 210-223.
- Vanjari, Hrishikesh B., Sheetal U. Bhandari, and Mahesh T. Kolte. "Enhancement of Speech for Hearing Aid Applications Integrating Adaptive Compressive Sensing with Noise Estimation Based Adaptive Gain." International Journal of Intelligent Systems and Applications in Engineering 11.7s (2023): 138-157.
- Vanjari, Hrishikesh B., and Mahesh T. Kolte. "Comparative Analysis of Speech Enhancement Techniques in Perceptive of Hearing Aid Design." Proceedings of the Third International Conference on Information Management and Machine Intelligence: ICIMMI 2021. Singapore: Springer Nature Singapore, 2022.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.