IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Secure and Optimized Proximity Mobile Payment Framework With Formal Verification

A Secure and Optimized Proximity Mobile Payment Framework With Formal Verification
View Sample PDF
Author(s): Shaik Shakeel Ahamad (KL University, India), V.N. Sastry (Institute for Development and Research in Banking Technology (IDRBT), India)and Siba K. Udgata (Institute for Development and Research in Banking Technology and University of Hyderabad, India)
Copyright: 2018
Pages: 29
Source title: Mobile Commerce: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-2599-8.ch010

Purchase

View A Secure and Optimized Proximity Mobile Payment Framework With Formal Verification on the publisher's website for pricing and purchasing information.

Abstract

In this paper the authors propose a Secure and Optimized Proximity Mobile Payment (SOPMP) Framework using NFC (Near Field Communication) technology, WPKI (Wireless Public Key Infrastructure), UICC (Universal Integrated Circuit Card). The novelty of this proposed mobile payment framework is messages are exchanged in the form of Digital Signature with Message Recovery (DSMR) and merchant sends Invoice in the form of Digital Invoice Certificate (DIC) (which is digitally signed by the merchant). The communication link between mobile phone and merchant POS (Point Of Sale) is NFC. Digital Signature with Message Recovery based on ECDSA eliminates the need of adopting PKI cryptosystems thereby reducing the consumption of resources i.e. it consumes less computational and communication cost. DSMR eliminates the need of certificates validation and removes the hurdle of PKI thereby reducing storage space, communication cost and computational cost. The authors proposed protocol ensures Authentication, Integrity, Confidentiality and Non Repudiation, achieves Identity protection from merchant and Eavesdropper, achieves Transaction privacy from Eavesdropper and Payment Gateway, achieves Payment Secrecy, Order Secrecy, forward secrecy, and prevents Double Spending, Overspending and Money laundering. In addition to these our proposed protocol withstands Replay, Man in the Middle and Impersonation attacks. The security properties of the proposed protocol have been verified using AVISPA and Scyther Tools and presented with results.

Related Content

Tapan Kumar Behera. © 2023. 20 pages.
B. Narendra Kumar Rao. © 2023. 17 pages.
Blendi Rrustemi, Deti Baholli, Herolind Balaj. © 2023. 18 pages.
Alma Beluli. © 2023. 11 pages.
Jona Ndrecaj, Shkurte Berisha, Erita Çunaku. © 2023. 15 pages.
Yllka Totaj. © 2023. 12 pages.
Hla Myo Tun, Devasis Pradhan. © 2023. 31 pages.
Body Bottom