Modelling, Design, and Analysis of Secure Mobile Payment Systems

نویسنده

  • Supakorn Kungpisdan
چکیده

Mobile payment allows users to perform payment transactions through their mobile devices. However, it brings up many emerging issues regarding security and performance of mobile payment systems that can be classified into at least two main problems. The first problem comes from the limitations of wireless environments that are primarily from mobile devices which have limited system resources and from wireless networks which have high connection cost, low bandwidth, and low reliability. In particular, a mobile user may not be able to efficiently performing highly secure transactions, which require high computational cryptographic operations, over the wireless network with the above characteristics. The second problem is the lack of sufficient security of existing mobile payment systems, mainly due to improper protocol design and the deployment of lightweight cryptographic operations which lead to the lack of important transaction security properties. Such problems have motivated the research conducted in this thesis. The purpose of this thesis is to propose methods to enable practical and secure mobile payment. The results obtained from this thesis may serve as a basis for protocol designers and system implementers to design and implement secure mobile payment systems and to analyze their existing mobile payment systems. The research conducted in this thesis focuses on three different levels of reasoning and securing mobile payment: formal model, framework, and protocol. We first propose a formal model for a practical and secure mobile payment

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design Limitations Characteristicsand Analysis of Secure Mobile Transaction and Protocols

Today, new technologies that allow cellular (mobile) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Commerce. What must be done to secure financial transactions via mobile commerce? Due to the advent of the Internet, electronic business transactions have exploded around the globe. Gener...

متن کامل

Analysis and Design of an Advanced Infrastructure for Secure and Anonymous Electronic Payment Systems on the Internet

Electronic payment systems are of paramount importance in our current digital society. Security and privacy constitute crucial challenges in this area. Electronic money is indeed just digital information that can easily be copied. Moreover, users automatically leave an electronic trail of all their activities in the digital world. In this thesis an advanced infrastructure for secure and anonymo...

متن کامل

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

The Role of Digital Adoption in relationship between payment systems development and economic growth

 This paper addresses the link between payment systems development and Economic growth and also investigates the role of technological growth and especially digital adoption status in this relationship. In this order, we use cross country data to compare Iranian payment systems situation with other countries in different aspects. Data analysis shows that Iran's payment systems are weaker in som...

متن کامل

Secure Authentication Protocol for NFC Mobile Payment Systems

Near Field Communication (NFC) is an attractive technology which is used in several countries for contactless payment operations via mobiles. This technology is suffered from increasing the security weaknesses. In the NFC mobile payment systems, the payment operations are vulnerable to various attacks. Therefore, the authentication protocol in the NFC technology has the highest priority to deve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005