Abstract
The growth of wireless networks and the increasing popularity of mobile devices present an significant opportunity to empower them as a payment device. Unfortunately, several problems hinder the widespread acceptance of mobile payments, for example, privacy protection and user anonymity. Measures to ensure anonymity in payment systems must be considered as an important factor in privacy and system acceptance. We propose a new measure to enhance the level of anonymity in mobile payments where users can customize their anonymity, according to their personal preferences. We rely on IPAS (Implicit Password Authentication System) (Almuairfi et al. 2011) for dispute resolution to support our proposed idea.
Similar content being viewed by others
References
Almuairfi S, Veeraraghavan P, Chilamkurti N (2011) IPAS: Implicit Password Authentication System. Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.
Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2) February.
Reed M, Syverson P, Goldschlag D (1998) Anonymous connections and onion routing. IEEE J Sel Areas Commun 16(4):482–494
Tan Soo F, Leau Yu B et al (2008) Privacy in new mobile payment protocol. World Academy of Science, Engineering and Technology 47, 2008.
Greenhill D (2011) Mobile commerce daily: Understanding the potential of in-store mobile media. March 29, 2011.
Copyright Wikipedia (2012) Payment card. http://en.wikipedia.org/wiki/Payment_card. Accessed 12 January 2012.
Santolalla O (2008) Mobile payment as key factor for mobile commerce success.
Martinez-Pelaez R, Rico-Novella F et al (2008) Mobile payment protocol for micropayments: withdrawal and payment anonymous. New Technologies, Mobility and Security, 2008. NTMS ‘08.
Wan Z, Wang Q (2010) Secure mobile payment based on Super SET protocol. Advanced Computer Control (ICACC), 2nd Int. Conf. IEEE
Boer R, de Boer T (2009) Mobile payments. Copyright Innopay, https://www.ebaportal.eu/_Download/Research%20and%20Analysis/2010/Mobile_payments_2010_Innopay.pdf. Accessed 7 October 2011.
Krawetz N (2006–2007) Point-of-sale vulnerabilities. Copyright (2006–2007) Hacker Factor Solutions, White Paper, http://www.hackerfactor.com/papers/cc-pos-20.pdf. Accessed 12 November 2010.
Murdoch SJ, Drimer S, Anderson R, Bond M (2010) “Chip and PIN is Broken,” sp, pp.433-446, 2010 IEEE Symposium on Security and Privacy.
“Security and Trust in Mobile Applications”, (2008), http://www.gemalto.com/telecom/download/security_trust_in_mobile_applications.pdf. Accessed 23 January 2012.
Schmidt AU, Kuntze N et al (2008) On the deployment of mobile trusted modules. Wireless Communications and Networking Conference, WCNC 2008. IEEE.
Murdoch SJ (2009) Reliability of Chip & PIN evidence in financial institute ing disputes. Digital Evid Electron Signat Law Rev 6:98–115
Author information
Authors and Affiliations
Corresponding author
Additional information
“This work supported in part by the Soonchunhyang university research fund”
Rights and permissions
About this article
Cite this article
Almuairfi, S., Veeraraghavan, P., Chilamkurti, N. et al. Anonymous proximity mobile payment (APMP). Peer-to-Peer Netw. Appl. 7, 620–627 (2014). https://doi.org/10.1007/s12083-012-0183-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-012-0183-1