Peer-to-Peer Networking and Applications

, Volume 7, Issue 4, pp 620–627 | Cite as

Anonymous proximity mobile payment (APMP)

  • Sadiq Almuairfi
  • Prakash Veeraraghavan
  • Naveen Chilamkurti
  • Doo-Soon Park
Article

Abstract

The growth of wireless networks and the increasing popularity of mobile devices present an significant opportunity to empower them as a payment device. Unfortunately, several problems hinder the widespread acceptance of mobile payments, for example, privacy protection and user anonymity. Measures to ensure anonymity in payment systems must be considered as an important factor in privacy and system acceptance. We propose a new measure to enhance the level of anonymity in mobile payments where users can customize their anonymity, according to their personal preferences. We rely on IPAS (Implicit Password Authentication System) (Almuairfi et al. 2011) for dispute resolution to support our proposed idea.

Keywords

Anonymity Near field communication Mobile payment 

References

  1. 1.
    Almuairfi S, Veeraraghavan P, Chilamkurti N (2011) IPAS: Implicit Password Authentication System. Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.Google Scholar
  2. 2.
    Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2) February.Google Scholar
  3. 3.
    Reed M, Syverson P, Goldschlag D (1998) Anonymous connections and onion routing. IEEE J Sel Areas Commun 16(4):482–494CrossRefGoogle Scholar
  4. 4.
    Tan Soo F, Leau Yu B et al (2008) Privacy in new mobile payment protocol. World Academy of Science, Engineering and Technology 47, 2008.Google Scholar
  5. 5.
    Greenhill D (2011) Mobile commerce daily: Understanding the potential of in-store mobile media. March 29, 2011.Google Scholar
  6. 6.
    Copyright Wikipedia (2012) Payment card. http://en.wikipedia.org/wiki/Payment_card. Accessed 12 January 2012.
  7. 7.
    Santolalla O (2008) Mobile payment as key factor for mobile commerce success.Google Scholar
  8. 8.
    Martinez-Pelaez R, Rico-Novella F et al (2008) Mobile payment protocol for micropayments: withdrawal and payment anonymous. New Technologies, Mobility and Security, 2008. NTMS ‘08.Google Scholar
  9. 9.
    Wan Z, Wang Q (2010) Secure mobile payment based on Super SET protocol. Advanced Computer Control (ICACC), 2nd Int. Conf. IEEEGoogle Scholar
  10. 10.
    Boer R, de Boer T (2009) Mobile payments. Copyright Innopay, https://www.ebaportal.eu/_Download/Research%20and%20Analysis/2010/Mobile_payments_2010_Innopay.pdf. Accessed 7 October 2011.
  11. 11.
    Krawetz N (2006–2007) Point-of-sale vulnerabilities. Copyright (2006–2007) Hacker Factor Solutions, White Paper, http://www.hackerfactor.com/papers/cc-pos-20.pdf. Accessed 12 November 2010.
  12. 12.
    Murdoch SJ, Drimer S, Anderson R, Bond M (2010) “Chip and PIN is Broken,” sp, pp.433-446, 2010 IEEE Symposium on Security and Privacy.Google Scholar
  13. 13.
    “Security and Trust in Mobile Applications”, (2008), http://www.gemalto.com/telecom/download/security_trust_in_mobile_applications.pdf. Accessed 23 January 2012.
  14. 14.
    Schmidt AU, Kuntze N et al (2008) On the deployment of mobile trusted modules. Wireless Communications and Networking Conference, WCNC 2008. IEEE.Google Scholar
  15. 15.
    Murdoch SJ (2009) Reliability of Chip & PIN evidence in financial institute ing disputes. Digital Evid Electron Signat Law Rev 6:98–115Google Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  • Sadiq Almuairfi
    • 1
  • Prakash Veeraraghavan
    • 1
  • Naveen Chilamkurti
    • 1
  • Doo-Soon Park
    • 2
  1. 1.Department of Computer Science and Computer EngineeringLa Trobe UniversityMelbourneAustralia
  2. 2.Department of Computer Software EngineeringSoonchunhyang UniversityAsanSouth Korea

Personalised recommendations