Skip to main content

A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce

  • Conference paper
Book cover E-Commerce and Web Technologies (EC-Web 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4655))

Included in the following conference series:

Abstract

A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (formally called ”Full connectivity scenario”). Despite of the advantages that the aforementioned scenario offers to protocol’s designers, regarding design simplification and development of payment protocols without losing security capabilities, the full connectivity scenario does not consider those situations in which the client cannot directly communicate with the issuer (Kiosk Centric Model) or the merchant has no direct communication with the acquirer (Client Centric Model). In order to overcome this restriction and contribute to the progress of m-commerce, in this paper we propose an anonymous protocol that uses a digital signature scheme with message recovery using self-certified public keys that is suitable for both the Kiosk Centric Model and Client Centric Model. As a result, our proposal shows that m-commerce is possible in restrictive connectivity scenarios, achieving the same security capabilities than other protocols designed for mobile payment systems based on ”Full connectivity scenario”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Herreweghen, E., Waidner, M.: Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communications 18(4), 611–627 (2000)

    Article  Google Scholar 

  2. Chang, Y., Chang, C., Huang, H.: Digital signature with message recovery using self-certified public keys without trustworthy system authority. Applied Mathematics and Computation 161(1), 211–227 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  3. Chari, S., Kermani, P., Smith, S., Tassiulas, L.: Security issues in m-commerce: A usage based taxonomy. In: Liu, J., Ye, Y. (eds.) E-Commerce Agents. LNCS (LNAI), vol. 2033, pp. 264–282. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Hall, J., Kilbank, S., Barbeau, M., Kranakis, E.: WPP: A Secure Payment Protocol for Supporting Credit- and Debit-card Transactions Over Wireless Networks. In: IEEE International Conference on Telecommunications (ICT) (2001)

    Google Scholar 

  5. Ham, W., Choi, H., Xie, Y., Lee, M., Kim, K.: A secure one-way mobile payment system keeping low computation in mobile devices. In: WISA 2002. LNCS, pp. 287–301. Springer, Heidelberg (2002)

    Google Scholar 

  6. Hu, Z., Liu, Y., Hu, X., Li, J.: Anonymous Micropayments Authentication (AMA) in Mobile Data Network. In: The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM), pp. 7–11 (2004)

    Google Scholar 

  7. Kungpisdan, S.: A secure account-based mobile payment system protocol. In: International Conference on Information Technology: Coding and Computing (ITCC), pp. 35–39 (2004)

    Google Scholar 

  8. Lei, Y., Chen, D., Jiang, Z.: Generating digital signatures on mobile devices. In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), pp. 532–535. IEEE Computer Society, Los Alamitos (2004)

    Chapter  Google Scholar 

  9. Téllez, J., Sierra, J., Izquierdo, A., Carbonell, M.: Payment in a Kiosk Centric Model with Mobile and Low Computational Power Devices. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, pp. 798–807. Springer, Heidelberg (2006)

    Google Scholar 

  10. Téllez, J., Sierra, J., Izquierdo, A., Márquez, J.: Anonymous Payment in a Kiosk Centric Model with Mobile using Digital signature scheme with message recovery and Low Computational Power Devices. Journal of Theoretical and Applied Electronic Commerce Research 1(2), 1–11 (2006)

    Google Scholar 

  11. Tseng, Y., Jan, J., Chien, H.: Digital signature with message recovery using self-certified public keys and its variants. Applied Mathematics and Computation 136(2-3), 203–214 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  12. Wang, H., Kranakis, E.: Secure Wireless Payment Protocol. In: International Conference on Wireless Networks, pp. 576–578 (2003)

    Google Scholar 

  13. Zhang, J., Zou, W., Chen, D., Wang, Y.: On the Security of a Digital Signature with Message Recovery using Self-certified Public Key. Soft Computing in Multimedia Processing, Special Issue of the Informatica Journal 29(3), 343–346 (2005)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Giuseppe Psaila Roland Wagner

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Isaac, J.T., Camara, J.S. (2007). A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce. In: Psaila, G., Wagner, R. (eds) E-Commerce and Web Technologies. EC-Web 2007. Lecture Notes in Computer Science, vol 4655. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74563-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74563-1_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74562-4

  • Online ISBN: 978-3-540-74563-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics