TELKOMNIKA Telecommunication, Computing, Electronics and Control
Secured e-payment system based on automated authentication data and iterated salted hash algorithm

Dublin Core

Title

TELKOMNIKA Telecommunication, Computing, Electronics and Control
Secured e-payment system based on automated authentication data and iterated salted hash algorithm

Subject

Data security, Encryption, Encryption password, Hash, Information security, RFID , SHA

Description

Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used C# language in visual studio environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption.

Creator

Ali Al Farawn, Hasanein D. Rjeib, Nabeel Salih Ali, Basheer Al-Sadawi

Source

DOI: 10.12928/TELKOMNIKA.v18i1.15623

Publisher

Universitas Ahmad Dahlan

Date

February 2020

Contributor

Sri Wahyuni

Rights

ISSN: 1693-6930

Relation

http://journal.uad.ac.id/index.php/TELKOMNIKA

Format

PDF

Language

English

Type

Text

Coverage

TELKOMNIKA Telecommunication, Computing, Electronics and Control

Files

Collection

Tags

,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

Citation

Ali Al Farawn, Hasanein D. Rjeib, Nabeel Salih Ali, Basheer Al-Sadawi, “TELKOMNIKA Telecommunication, Computing, Electronics and Control
Secured e-payment system based on automated authentication data and iterated salted hash algorithm,” Repository Horizon University Indonesia, accessed November 21, 2024, https://repository.horizon.ac.id/items/show/3515.