Skip to main content
Log in

Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

Vehicular ad hoc networks (VANETs) are envisioned to support the development of a wide range of attractive applications such as payment services which require the design of payment systems that satisfy additional requirements associated with VANETs. The wide range of scenarios (with or without connectivity restriction) arising from vehicle-to-vehicle and vehicle-to-roadside communications have opened up new security challenges which must be considered by payment system designers to achieve the same security capabilities independent of the scenario where payment occurs. We propose and implement a new payment protocol (called KCMS-VAN protocol) for those scenarios where the client cannot communicate directly with the credit card issuer (the client’s financial institution) for authentication. Our proposed protocol uses symmetric-key operations which require low computational power and can be processed much faster than asymmetric ones. We also present a performance evaluation of the proposed payment protocol and the results obtained demonstrate that optimal performance can be achieved with it.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Abad Peiro, J. L., Asokan, N., Steiner, M., & Waidner, M. (1997). Designing a generic payment service. IBM Systems Journal, 37(1), 72–88.

    Article  Google Scholar 

  2. Asokan, N. (1994). Anonymity in Mobile computing environment. In Workshop on mobile computing systems and applications (pp. 200–2004).

  3. Bella, G., & Bistarelli, S. (2005). Information assurance for security protocols. Computers and Security, 24(4), 322–333.

    Article  Google Scholar 

  4. Bellare, M. (2006). New proofs for NMAC and HMAC: security without collision-resistance. In The 26th annual international cryptology conference (Crypto 2006) (pp. 602–619).

  5. Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Van Herreweghen, Els., & Waidner, M. (2000). Design, implementation and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communication, 18(4), 611–627.

    Article  Google Scholar 

  6. Certicom (2003). The next generation of cryptography. Code and Cipher: Certicom’s Bulletin of Security and Cryptography, 1 (1).

  7. Car2Car Communication Consortium (2007). Overview of the C2C-CC system (Technical Report version 1.0). Car2Car Communication Consortium.

  8. Chari, S., Kermani, P., Smith, S., & Tassiulas, L. (2001). Security issues in M-commerce: a usage-based taxonomy. In E-commerce agents (pp. 264–282).

  9. Hassinen, M., Hyppönen, K., & Haatajam, K. (2006). An open, PKI-based mobile payment system. In Emerging trends in information and communication security, international conference (ETRICS’2006) (pp. 86–100).

  10. Hu, Z., Liu, Y., Hu, X., & Li, J. (2004). Anonymous micropayments authentication (AMA) in mobile data network. In 23rd Annual joint conference of the IEEE computer and communications societies (IEEE INFOCOM) (pp. 46–53).

  11. Hwang, R., Su, F., & Huang, L. (2007). Fast firmware implementation of RSA-like security protocol for mobile devices. Wireless Personal Communications, 42(2), 213–223.

    Article  Google Scholar 

  12. J. Hall, J., Kilbank, S., Barbeu, M., & Kranakis, E. (2001). WPP: a secure payment protocol for supporting credit-and debit-card transactions over wireless networks. In International conference on telecommunications (ICT 2001).

  13. Juntao, M. (2003). Enterprise J2ME: developing mobile Java applications. New York: Prentice Hall PTR.

    Google Scholar 

  14. Krawczyk, H., Bellare, M., & Canetti, R. (1997). HMAC: keyed-hashing for message authentication, RFC 2104.

  15. Kungpisdan, S., Srinivasan, B., & Dunf Le, P. (2004). A secure account-based mobile payment protocol. In International conference on information technology: coding and computing (ITCC’04) (pp. 35–39).

  16. Kungpisdan, S., Srinivasan, B., & Dung Le, P. (2003). Lightweight mobile credit-card payment protocol. In 4th International conference on cryptology in India (progress in cryptology—INDOCRYPT 2003) (pp. 295–308).

  17. Lei, Y., Chen, D., & Jiang, Z. (2004). Generating digital signatures on mobile devices. In 18th International conference on advanced information networking and applications (AINA’04) (pp. 532–535).

  18. Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook of applied cryptography. Boca Raton: CRC Press.

    Google Scholar 

  19. NIST (1999). FIPS PUB 46-3 Data Encryption Standard (DES). http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf.

  20. NIST (2001). FIPS PUB 197 Advance Encryption Standard (AES). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.

  21. Papadimitratos, P., Kung, A., Hubaux, J.-P., & Kargl, F. (2006). Privacy and identity management for vehicular communication systems: a position paper. In Workshop on standards for privacy in user-centric identity management.

  22. Potlapally, N., Ravi, S., Raghunathan, A., & Jha, N. (2003). Analyzing the energy consumption of security protocols. In 2003 International symposium on low power electronics and design (ISLPED’03) (pp. 30–35).

  23. Ravi, S., Raghunalhan, A., & Potlapally, N. (2002). Securing wireless data: system architecture challenges. In 15th International symposium on system synthesis (pp. 195–200).

  24. Raya, M., & Hubaux, J.-P. (2005). The security of vehicular ad hoc networks. In 3rd ACM workshop on security of ad hoc and sensor networks (SASN’05) (pp. 11–21).

  25. Sanchez-Avila, C., & Sanchez-Reillol, R. (2001). The Rijndael block cipher (AES proposal): a comparison with DES. In 35th IEEE international Carnahan conference on security technology (pp. 229–234).

  26. Sukuvaara, T., & Pomalaza-RÃ!‘ez, C. (2009). Vehicular networking pilot system for vehicle-to-infrastructure and vehicle-to-vehicle communications. International Journal of Communication Networks and Information Security, 1(3), 1–10.

    Google Scholar 

  27. Téllez, J., & Sierra, J. (2007). A secure payment protocol for restricted connectivity scenarios in M-commerce. In EC-Web (pp. 1–10).

  28. Téllez, J., & Sierra, J. (2007). Anonymous payment in a client centric model for digital ecosystems. In Inaugural IEEE international conference on digital ecosystems and technologies (IEEE-DEST 2007) (pp. 422–427).

  29. Téllez, J., & Sierra, J. (2007). An anonymous account-based mobile payment protocol for a restricted connectivity scenario. In DEXA workshops (pp. 688–692).

  30. Téllez, J., Sierra, J., Izquierdo, A., & Carbonell, M. (2006). Payment in a kiosk centric model with mobile and low computational power devices. In Computational science and its applications (ICCSA 2006) (Part V, pp. 798–807).

  31. Téllez, J., Sierra, J., Izquierdo, A., & Torres, J. (2006). Anonymous payment in a Kiosk centric model using digital signature scheme with message recovery and low computational power devices. Journal of Theoretical and Applied Electronic Commerce Research, 1(2), 1–11.

    Google Scholar 

  32. Téllez, J., Sierra, J., Zeadally, S., & Torres, J. (2008). A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. Computer Communications, 31(10), 2478–2484.

    Article  Google Scholar 

  33. The Legion of the Bouncy Castle (2008). The Legion of the Bouncy Castle Java cryptography APIs version 1.4. http://www.bouncycastle.org/, 2008.

  34. Sun Microsystem (2008). Java platform, micro edition (Java SE) v 1.6.0, API specification. http://java.sun.com/javase/index.jsp.

  35. Sun Microsystem (2008). Java platform, micro edition (Java ME), API specification. http://java.sun.com/javame/index.jsp.

  36. Wang, H., & Kranakis, E. (2003). Secure wireless payment protocol. In International conference on wireless networks (pp. 576–582).

  37. Yousefi, S., Mousavi, M., & Fathy, M. (2006). Vehicular ad hoc networks (VANETs): challenges and perspectives. In 6th International conference on ITS telecommunications (pp. 761–766).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jesús Téllez Isaac.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Téllez Isaac, J., Zeadally, S. & Sierra, J.C. Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks. Electron Commer Res 10, 209–233 (2010). https://doi.org/10.1007/s10660-010-9052-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10660-010-9052-2

Keywords

Navigation