Reference Hub3
A Secure Mobile Payment Framework in MANET Environment

A Secure Mobile Payment Framework in MANET Environment

Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata
Copyright: © 2013 |Volume: 9 |Issue: 1 |Pages: 31
ISSN: 1548-1131|EISSN: 1548-114X|EISBN13: 9781466631670|DOI: 10.4018/jebr.2013010104
Cite Article Cite Article

MLA

Ahamad, Shaik Shakeel, et al. "A Secure Mobile Payment Framework in MANET Environment." IJEBR vol.9, no.1 2013: pp.54-84. http://doi.org/10.4018/jebr.2013010104

APA

Ahamad, S. S., Sastry, V. N., & Udgata, S. K. (2013). A Secure Mobile Payment Framework in MANET Environment. International Journal of E-Business Research (IJEBR), 9(1), 54-84. http://doi.org/10.4018/jebr.2013010104

Chicago

Ahamad, Shaik Shakeel, V. N. Sastry, and Siba K. Udgata. "A Secure Mobile Payment Framework in MANET Environment," International Journal of E-Business Research (IJEBR) 9, no.1: 54-84. http://doi.org/10.4018/jebr.2013010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this paper the authors propose a Secure Mobile Payment Framework in Multi hop Cellular Network environment (which is an integration of cellular networks and mobile ad hoc networks) using Mobile Agent technology and Digital Signature with Message Recovery (DSMR) mechanism based on ECDSA mechanism. Secure communication in Multi hop Cellular Networks is a nontrivial task because of lack of infrastructure, no prior trust relationships among nodes due to the absence of a centralized authority. Mobile Agent technology and Digital Signature with Message Recovery based on ECDSA mechanism provides secure mobile payments in Multi hop Cellular Networks. Mobile Agent technology has many benefits such as bandwidth conservation, reduction of latency, reduction of completion time, Asynchronous (disconnected) communications. Digital Signature with Message Recovery based on ECDSA eliminates the need of adopting PKI cryptosystems. The proposed protocol ensures Authentication, Integrity, Confidentiality and Non Repudiation, achieves Identity protection from merchant and Eavesdropper, achieves Transaction privacy from Eavesdropper and Payment Gateway, achieves Payment Secrecy, Order Secrecy, forward secrecy, prevents Double Spending, Overspending and Money laundering. The security properties of the proposed protocol have been verified successfully using BAN Logic, AVISPA and Scyther Tools and presented with results.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.