Anonymous proximity mobile payment (APMP)
Rent the article at a discountRent now
* Final gross prices may vary according to local VAT.Get Access
The growth of wireless networks and the increasing popularity of mobile devices present an significant opportunity to empower them as a payment device. Unfortunately, several problems hinder the widespread acceptance of mobile payments, for example, privacy protection and user anonymity. Measures to ensure anonymity in payment systems must be considered as an important factor in privacy and system acceptance. We propose a new measure to enhance the level of anonymity in mobile payments where users can customize their anonymity, according to their personal preferences. We rely on IPAS (Implicit Password Authentication System) (Almuairfi et al. 2011) for dispute resolution to support our proposed idea.
- Almuairfi S, Veeraraghavan P, Chilamkurti N (2011) IPAS: Implicit Password Authentication System. Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.
- Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2) February.
- Reed M, Syverson P, Goldschlag D (1998) Anonymous connections and onion routing. IEEE J Sel Areas Commun 16(4):482–494 CrossRef
- Tan Soo F, Leau Yu B et al (2008) Privacy in new mobile payment protocol. World Academy of Science, Engineering and Technology 47, 2008.
- Greenhill D (2011) Mobile commerce daily: Understanding the potential of in-store mobile media. March 29, 2011.
- Copyright Wikipedia (2012) Payment card. http://en.wikipedia.org/wiki/Payment_card. Accessed 12 January 2012.
- Santolalla O (2008) Mobile payment as key factor for mobile commerce success.
- Martinez-Pelaez R, Rico-Novella F et al (2008) Mobile payment protocol for micropayments: withdrawal and payment anonymous. New Technologies, Mobility and Security, 2008. NTMS ‘08.
- Wan Z, Wang Q (2010) Secure mobile payment based on Super SET protocol. Advanced Computer Control (ICACC), 2nd Int. Conf. IEEE
- Boer R, de Boer T (2009) Mobile payments. Copyright Innopay, https://www.ebaportal.eu/_Download/Research%20and%20Analysis/2010/Mobile_payments_2010_Innopay.pdf. Accessed 7 October 2011.
- Krawetz N (2006–2007) Point-of-sale vulnerabilities. Copyright (2006–2007) Hacker Factor Solutions, White Paper, http://www.hackerfactor.com/papers/cc-pos-20.pdf. Accessed 12 November 2010.
- Murdoch SJ, Drimer S, Anderson R, Bond M (2010) “Chip and PIN is Broken,” sp, pp.433-446, 2010 IEEE Symposium on Security and Privacy.
- “Security and Trust in Mobile Applications”, (2008), http://www.gemalto.com/telecom/download/security_trust_in_mobile_applications.pdf. Accessed 23 January 2012.
- Schmidt AU, Kuntze N et al (2008) On the deployment of mobile trusted modules. Wireless Communications and Networking Conference, WCNC 2008. IEEE.
- Murdoch SJ (2009) Reliability of Chip & PIN evidence in financial institute ing disputes. Digital Evid Electron Signat Law Rev 6:98–115
- Anonymous proximity mobile payment (APMP)
Peer-to-Peer Networking and Applications
Volume 7, Issue 4 , pp 620-627
- Cover Date
- Print ISSN
- Online ISSN
- Springer US
- Additional Links
- Near field communication
- Mobile payment
- Industry Sectors
- Author Affiliations
- 1. Department of Computer Science and Computer Engineering, La Trobe University, Melbourne, VIC, Australia
- 2. Department of Computer Software Engineering, Soonchunhyang University, Asan, South Chungcheong province, South Korea