IDEAS home Printed from https://ideas.repec.org/a/wly/mgtdec/v45y2024i4p1817-1834.html
   My bibliography  Save this article

An introduction of transaction session‐induced security scheme using blockchain technology: Understanding the features of Internet of Things–based financial security systems

Author

Listed:
  • Wen Wen
  • Xiao Han

Abstract

Internet of Things (IoT)–based financial systems leverage the capabilities of blockchain and artificial intelligence (AI) to enable seamless transactions and data exchange between devices. IoT‐based financial systems involve interconnected devices and services, such as payment terminals, wearables, and smart appliances, which collect, transmit, and process sensitive financial information. The study explores security methods incorporated in the financial systems designed using IoT and blockchain technologies to improve the background features. The study data were gathered from Complaint Data from the Consumer Financial Protection Bureau 2018–2022, and data‐based analysis is used in this study for detecting illegitimate interrupted transactions. Propensity Score Matching (PSM) is used for the robustness and endogeneity test; descriptive statistics is utilized in this study. Financial security systems are introduced to reduce the forging and breaching of intruders amid transactions. This study offers a novel contribution to the field of blockchain technology by furnishing a comprehensive analysis of the features of IoT‐based financial security systems from the perspective of the transaction, broadening the understanding of the feature focusing on financial security, and providing practical recommendations to address the features of IoT‐based financial security systems in blockchain technology. The study highlights how IoT devices can securely record and verify financial transactions by leveraging the blockchain's distributed ledger, preventing tampering or unauthorized access. The results of the study identify that the TS3 program relies on the transaction gaps between financial sessions, security requests between successive transactions, and sessions saved depending on the time delay. The study finds that sessions were analyzed for violations and fraud using information stored on the blockchain. The study suggests the design and building of devices and sensors in an IoT in financial security systems. Transparency should contribute to setting data privacy and safety problems in financial security systems.

Suggested Citation

  • Wen Wen & Xiao Han, 2024. "An introduction of transaction session‐induced security scheme using blockchain technology: Understanding the features of Internet of Things–based financial security systems," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 45(4), pages 1817-1834, June.
  • Handle: RePEc:wly:mgtdec:v:45:y:2024:i:4:p:1817-1834
    DOI: 10.1002/mde.4043
    as

    Download full text from publisher

    File URL: https://doi.org/10.1002/mde.4043
    Download Restriction: no

    File URL: https://libkey.io/10.1002/mde.4043?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:mgtdec:v:45:y:2024:i:4:p:1817-1834. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www3.interscience.wiley.com/cgi-bin/jhome/7976 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.