A Secure Account-Based Mobile Payment Protocol with Public Key Cryptography
نویسندگان
چکیده
The way people do the business and transactions are changing drastically with the advent of Information Technology. The customer wants to access information, goods and services any time and in any place on his mobile device. Receiving financial data, trade on stock exchanges, accessing balances, paying bills and transfer funds using SMS are done through mobile phones. Due to involvement of valuable financial and personal information, the mobile phones are vulnerable to numerous security threats. Most common activity in M-Commerce is the payment to the merchant using a mobile phone. In this paper we present a secure account–based payment protocol which is suitable for M-commerce to transfer the payment from wireless networks based on public key cryptography. Based on author knowledge, this is a first kind of protocol which applies public key cryptography to mobile network and satisfies all the security requirements of the properties provided by standard protocols for wired networks such as SET and iKP. IndexTerms—Electronic commerce protocol, Mobile payment, Wireless payment, Credit card payment, Cryptographic Protocol, Account–Based protocol
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملA NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
متن کاملA Need for Peer-to-peer Strong Local Authentication Protocol (p2pslap) in Mobile Banking
Mobile phones are considered to be the most common devices in history of humankind. They have involved in financial transaction such as mobile banking and mobile payment, which include sensitive information. Public key cryptography is the proven solution that can provide secure transaction at every point of interaction in mobile banking value chain. This paper proposes a need for peer-to-peer S...
متن کاملPrivate and Secure Public-Key Distance Bounding - Application to NFC Payment
Distance-Bounding is used to defeat relay attacks. For wireless payment systems, the payment terminal is not always online. So, the protocol must rely on a public key for the prover (payer). We propose a generic transformation of a (weakly secure) symmetric distance bounding protocol which has no postverification into wide-strong-private and secure public-key distance bounding.
متن کاملSecure Protocol for Short Message Service
Short Message Service (SMS) has grown in popularity over the years and it has become a common way of communication, it is a service provided through General System for Mobile Communications (GSM) that allows users to send text messages to others. SMS is usually used to transport unclassified information, but with the rise of mobile commerce it has become a popular tool for transmitting sensitiv...
متن کامل