Wednesday, June 8, 2011

The mobile commerce prospects: A strategic analysis of ecommerce possibilities with publication of the mobile money Application programming Interface (API)

To improve third party innovativeness, in relation to application development, developers often use existing class libraries or frame works by invoking the Application Programming Interfaces (API).  APIs enable applications to request other software to perform functions that they may not be able or permitted to access. Not publishing an application’s API, says Josh Waker, an analyst at Forrester Research Inc. in Cambridge, Mass, "is basically like building a house with no doors. The API for all computing purposes is how you open the blinds and the doors and exchange information." Companies should consider publishing APIs of applications they develop, especially if they expect the applications to last and interact with other applications, Braunstein says.
The API architecture has created a mashed up environment, this has saved developers time from having to find and review the source code of software. Electronic commerce (e-commerce) depends on applications accessing bank or website APIs to enable processing of a transaction. E-commerce consists of the buying and selling of products or services over electronic systems such as the internet and other computer networks (1). The e-commerce sector depends heavily on third party innovations for growth and development. Traditionally e-commerce has been between banks and credit card companies, but Bank penetration in Africa at lower than 10 percent in some regions of Africa has hindered e-commerce. GSMA reports that there will be 1.7 billion unbanked customers and these customers will have access to mobile phones (4).
Mobile money has led to increased access to financial services as well as the development of new financial instruments around the world (3).  To enable third parties that want to realize the potential of mobile money, research has been carried out to unify the policies and laws that are governing mobile money transactions and the banks to unify the laws; this is because traditionally telecom operators were not involved in the money business. The mobile money platform so far has mainly dealt with sending and receiving money. The introduction of new services of payment for services has been seen that is to say; water and electricity bill payment and DSTV subscription payment, this shows that customers are demanding more than just sending and receiving money.  Clearly the telecom companies are not up to task of developing and innovating applications to fill the vacuum. This has not been helped by third party companies finding difficulty in accessing the API for the mobile money system, hence limited interfacing of the mobile applications with third party developed applications, hence low rate of application innovation and creation by third party application developers.
The purpose of this paper is to shed light on the role of API publications play, mobile money APIs, in relation to third party application development.
Description: ProgrammableWeb Mashup Timeline
Figure: The Number of Mashups in the last 6 months (source: www. Programmableweb.com)
This research is carried out because none or limited research has been conducted on the effects created as a result of east Africa mobile operators failing to publish the mobile money API. This is in respect to third party application development in order to leverage the benefits of mobile money.
 The objective is to determine the relationship between API Publishing and number of applications developed by third party developers to access the functionality of the published software.

Wednesday, January 12, 2011

Survey of NFC security

Introduction
NFC is a wireless proximity communication technology allowing us to transfer data over a distance of up to 10 cm.
NCF is a contactless technology , A contactless technology as one that lets users pay for transactions by simply holding cards close to, rather than swiping them through a reader.
Combining NFC technology with applications such as payment in a mobile device or contactless access raises potential security risks and attacks. Attacks against an NFC device can be performance anywhere and may not be noticed by the victim as the communication itself is contactless.
The technology is relatively new to be accepted widely world it should demonstrate the ability to fend off attacks.


NFC Operation Modes
NFC devices are unique in that they can change their mode of operation to be in reader/writer mode, peer-to-peer mode, or card emulation mode. The different operating modes are based on the ISO/IEC 18092 NFC IP-1 and ISO/IEC 14443 contactless smart card standards. Madmayr and Langer give the NFC modes in as;
  1. Reader/writer mode
In reader/writer mode, the NFC device is capable of reading NFC Forum mandated tag types, such as in the scenario of reading an NFC Smart poster tag. The reader/writer mode is on the RF interface compliant to the ISO 14443 and FeliCa schemes.
  1. Card Emulation
In Card Emulation mode, the NFC device itself acts as an NFC tag, appearing to an external reader much the same as a traditional contactless smart card. This enables contactless payments and e-ticketing, for example.
  1. Peer to peer
In Peer-to-Peer mode, two NFC devices can exchange data. For example, you can share Bluetooth or WiFi link set up parameters, and exchange data such as virtual business cards or digital photos. Peer-to-Peer mode is standardized on the ISO/IEC 18092 standard.


NFC threats
From the operational modes discussed in the previous section, the following attacks can be performed on the different modes;
  1. Eaves dropping
When two devices communicate via NFC they use RF waves to talk to each other. An attacker can use an antenna to also receive the transmitted signals.
The main question is how close an attacker needs to be to be able to retrieve a usable RF (Radio Frequency) signal? There is no correct answer to this question, the reason for that is the huge number of parameters which determine the answer. For example characteristics of the attacker’s antenna, quality of the attacker’s receiver, power sent out by the NFC device and so on. Additionally the mode in which the sender of the data is operating i.e. whether the sender is generating its own RF field (active mode) or whether the sender is using the RF field generated by another device (passive mode), can be used to determine eave’s dropping because of the different ways of transmitting the data for example it is harder to eaves drop on devices sending data in passive mode.
  1. Data corruption
An attacker can try to modify the data which is transmitted via the NFC interface. This can be achieved by transmitting valid frequencies of the data spectrum at a correct time. It is basically a denial of service attack.
  1. Data modification
In data modification the attacker wants the receiving device to actually receive some valid but manipulated data
  1. Data insertion
This means that the attacker inserts messages into the data exchange between two devices. The attacker could then send his data earlier than the valid receiver. The insertion will be successful only if the inserted data can be transmitted before the original device start with the answer.




Conclusion
In this survey, I have given the possible attacks that can be performed on the Near-Field Technology. These attacks are not limited to NFC wireless technology only; other wireless technologies are susceptible to these very attacks e.g. Bluetooth, Zigbee etc. I hope this survey will make students and general public appreciate the technology and affirm security of the technology in order for the usage and adapt it widely.

Tuesday, January 11, 2011

Feature Phones vs Smart phones

Majority of mobile phone users can not differentiate between a feature phone and a smart phone, this is a very interesting aspect in the mobile phone industry given the fact that the boundary between these phones has become blurred with technology advancements.
From a lay man's perspective, one can easily give the reason that feature phones are less complex and cheaper in price while smart phones are complex and more expensive in terms of cost. These reasons no longer hold water with the technology advancements in making feature phones not so simple anymore, base on them and you are Fukked!! 
So back to basics, Let me start with the definition of both the feature phone and smart phone the truth is that there is no standard definition of both these phones in the industry, the definitions i use are general. A feature phone is low end mobile phone having low memory and storage. CNET defines a smart phone as a phone running third-party operating system forexample Android, windows mobile, symbian and so on. Smart phones allow third party software to be installed on them.
Breaking down smart phone features which are:
1. larger screen
2. powerful processor
3. large memory capacity (gigabytes)
4. Cost – a smartphone will generally be more expensive than a standard phone.
5.Applications – Smartphones allow you to install applications, or ‘apps,’ onto your mobile phone.
6. Email – This feature allows you to receive emails (in real time) as they are detected by your phone.
7.Mobile Operating System – The most popular operating systems include Symbian OS (Nokia, LG, Motorola, Samsung, Sony Ericsson), iPhone OS, BlackBerry or Android (HTC). The mobile operating system will allow you to perform specific tasks such as editing a document or viewing a PDF file.
I hope this is useful to some people out there or even help them be a part of a conversation..hehehe

The Right Tablet

Research in Motion (RIM) plans to release it's tablet which may be called 'Blackpad' in march 2011, blackberry lovers must have been wondering why RIM had taken too long to jump in the growing and apple dominated market of tablets with the ipad.

The ipad set a land mark by setting the fastest selling electronic gadget in 2010. Blackberry has been planning to get everything right and indeed they have, they purchased an operating system instead of using the android OS , QNX OS, for the playbook for longer battery time and faster processing, smaller screen at 7" compared to the ipad at 9.7", lighter than the ipad and a more advanced processor ARM’s Cortex-A9 CPU core. Clearly blackberry wants the the apple users and to lead the tablet market!
Can't wait to get my hands on this tablet and put it to use!