An Architectural Design for Secure Mobile Remote Macro-Payments

نویسندگان

  • S. Britto R. Kumar
  • S. Albert Rabara
چکیده

The high market penetrations of mobile personal devices including mobile phones, PDAs have paved a way for the development of new application models in Mobile Commerce. Mobile phones are well suited with mobile commerce to reach the customers anywhere and at any time. Mobile Payments are the natural evolution of e-payment schemes that facilitate mobile commerce. The mobile payment markets are categorized into a combination of micro/macro-payments and remote/local mobile payment environments. A study reveals that there are different initiatives have already been launched in mobile remote macro-payment areas such as PayPal Mobile or Google Checkout Mobile. However, those initiatives are focused on a limited number of m-payment opportunities. For example, PayPal focused on P2P payments and mobile shopping via SMS. Also, the existing systems are still suffering from security breaches. This paper proposes an architectural design for Secure Mobile Payment System that supports remote macro-payments. The main aim of this architecture is to achieve end-to-end security using symmetric operations. Since the development of secure mobile payment system for remote macro payments is a hot research topic in research community, this paper proposes an effective architecture to carry out the payment transactions between the customer and merchant. The proposed architecture ensures high level security in transactions and provides convenient payment mechanism.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Operational Model for Mobile Payments

Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is base...

متن کامل

Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet

This paper describes our concept, design and current implementation of the Secure Mobile Wallet. Mobile Wallet is an application stored in mobile phones providing to subscribers the possibility to perform various mobile financial transactions. In our approach Secure Mobile Wallet is stored and running in the Javacard SIM chip, called UICC module. The Wallet comprises several Javacard applets su...

متن کامل

User Acceptance of Mobile Payments: A Theoretical Model for Mobile Payments

Mobile payment refers to the use of mobile devices to conduct payment transactions. Users can use mobile devices for remote and proximity payments; moreover, they can purchase digital contents and physical goods and services. It offers an alternative payment method for consumers. However, there are relative low adoption rates in this payment method. This research aims to identify and explore ke...

متن کامل

Exploring the role of architectural design in creating a sense of security and residential satisfaction in affordable residential complexes for young Iranian low-income families

The most important requirement of the family after food and clothing is housing. It also plays an important role in providing safety and security etc. for the family. Security is important therefore it is placed among other human physiological needs like food, shelter and sanitation. Security feeling is one of the main factorsin stability of urban spaces. It can be said that secure enviro...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JNIT

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2010