Abstract
A significant number of mobile payment systems have been proposed in recent years, most of them based on a scenario where all the entities are directly connected one to another (formally called ”Full connectivity scenario”). Despite of the advantages that the aforementioned scenario offers to protocol’s designers, regarding design simplification and development of payment protocols without losing security capabilities, the full connectivity scenario does not consider those situations in which the client cannot directly communicate with the issuer (Kiosk Centric Model) or the merchant has no direct communication with the acquirer (Client Centric Model). In order to overcome this restriction and contribute to the progress of m-commerce, in this paper we propose an anonymous protocol that uses a digital signature scheme with message recovery using self-certified public keys that is suitable for both the Kiosk Centric Model and Client Centric Model. As a result, our proposal shows that m-commerce is possible in restrictive connectivity scenarios, achieving the same security capabilities than other protocols designed for mobile payment systems based on ”Full connectivity scenario”.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Herreweghen, E., Waidner, M.: Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communications 18(4), 611–627 (2000)
Chang, Y., Chang, C., Huang, H.: Digital signature with message recovery using self-certified public keys without trustworthy system authority. Applied Mathematics and Computation 161(1), 211–227 (2005)
Chari, S., Kermani, P., Smith, S., Tassiulas, L.: Security issues in m-commerce: A usage based taxonomy. In: Liu, J., Ye, Y. (eds.) E-Commerce Agents. LNCS (LNAI), vol. 2033, pp. 264–282. Springer, Heidelberg (2001)
Hall, J., Kilbank, S., Barbeau, M., Kranakis, E.: WPP: A Secure Payment Protocol for Supporting Credit- and Debit-card Transactions Over Wireless Networks. In: IEEE International Conference on Telecommunications (ICT) (2001)
Ham, W., Choi, H., Xie, Y., Lee, M., Kim, K.: A secure one-way mobile payment system keeping low computation in mobile devices. In: WISA 2002. LNCS, pp. 287–301. Springer, Heidelberg (2002)
Hu, Z., Liu, Y., Hu, X., Li, J.: Anonymous Micropayments Authentication (AMA) in Mobile Data Network. In: The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM), pp. 7–11 (2004)
Kungpisdan, S.: A secure account-based mobile payment system protocol. In: International Conference on Information Technology: Coding and Computing (ITCC), pp. 35–39 (2004)
Lei, Y., Chen, D., Jiang, Z.: Generating digital signatures on mobile devices. In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), pp. 532–535. IEEE Computer Society, Los Alamitos (2004)
Téllez, J., Sierra, J., Izquierdo, A., Carbonell, M.: Payment in a Kiosk Centric Model with Mobile and Low Computational Power Devices. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, pp. 798–807. Springer, Heidelberg (2006)
Téllez, J., Sierra, J., Izquierdo, A., Márquez, J.: Anonymous Payment in a Kiosk Centric Model with Mobile using Digital signature scheme with message recovery and Low Computational Power Devices. Journal of Theoretical and Applied Electronic Commerce Research 1(2), 1–11 (2006)
Tseng, Y., Jan, J., Chien, H.: Digital signature with message recovery using self-certified public keys and its variants. Applied Mathematics and Computation 136(2-3), 203–214 (2003)
Wang, H., Kranakis, E.: Secure Wireless Payment Protocol. In: International Conference on Wireless Networks, pp. 576–578 (2003)
Zhang, J., Zou, W., Chen, D., Wang, Y.: On the Security of a Digital Signature with Message Recovery using Self-certified Public Key. Soft Computing in Multimedia Processing, Special Issue of the Informatica Journal 29(3), 343–346 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Isaac, J.T., Camara, J.S. (2007). A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce. In: Psaila, G., Wagner, R. (eds) E-Commerce and Web Technologies. EC-Web 2007. Lecture Notes in Computer Science, vol 4655. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74563-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-74563-1_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74562-4
Online ISBN: 978-3-540-74563-1
eBook Packages: Computer ScienceComputer Science (R0)