Anonymous proximity mobile payment (APMP)
- 807 Downloads
The growth of wireless networks and the increasing popularity of mobile devices present an significant opportunity to empower them as a payment device. Unfortunately, several problems hinder the widespread acceptance of mobile payments, for example, privacy protection and user anonymity. Measures to ensure anonymity in payment systems must be considered as an important factor in privacy and system acceptance. We propose a new measure to enhance the level of anonymity in mobile payments where users can customize their anonymity, according to their personal preferences. We rely on IPAS (Implicit Password Authentication System) (Almuairfi et al. 2011) for dispute resolution to support our proposed idea.
KeywordsAnonymity Near field communication Mobile payment
- 1.Almuairfi S, Veeraraghavan P, Chilamkurti N (2011) IPAS: Implicit Password Authentication System. Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.Google Scholar
- 2.Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2) February.Google Scholar
- 4.Tan Soo F, Leau Yu B et al (2008) Privacy in new mobile payment protocol. World Academy of Science, Engineering and Technology 47, 2008.Google Scholar
- 5.Greenhill D (2011) Mobile commerce daily: Understanding the potential of in-store mobile media. March 29, 2011.Google Scholar
- 6.Copyright Wikipedia (2012) Payment card. http://en.wikipedia.org/wiki/Payment_card. Accessed 12 January 2012.
- 7.Santolalla O (2008) Mobile payment as key factor for mobile commerce success.Google Scholar
- 8.Martinez-Pelaez R, Rico-Novella F et al (2008) Mobile payment protocol for micropayments: withdrawal and payment anonymous. New Technologies, Mobility and Security, 2008. NTMS ‘08.Google Scholar
- 9.Wan Z, Wang Q (2010) Secure mobile payment based on Super SET protocol. Advanced Computer Control (ICACC), 2nd Int. Conf. IEEEGoogle Scholar
- 10.Boer R, de Boer T (2009) Mobile payments. Copyright Innopay, https://www.ebaportal.eu/_Download/Research%20and%20Analysis/2010/Mobile_payments_2010_Innopay.pdf. Accessed 7 October 2011.
- 11.Krawetz N (2006–2007) Point-of-sale vulnerabilities. Copyright (2006–2007) Hacker Factor Solutions, White Paper, http://www.hackerfactor.com/papers/cc-pos-20.pdf. Accessed 12 November 2010.
- 12.Murdoch SJ, Drimer S, Anderson R, Bond M (2010) “Chip and PIN is Broken,” sp, pp.433-446, 2010 IEEE Symposium on Security and Privacy.Google Scholar
- 13.“Security and Trust in Mobile Applications”, (2008), http://www.gemalto.com/telecom/download/security_trust_in_mobile_applications.pdf. Accessed 23 January 2012.
- 14.Schmidt AU, Kuntze N et al (2008) On the deployment of mobile trusted modules. Wireless Communications and Networking Conference, WCNC 2008. IEEE.Google Scholar
- 15.Murdoch SJ (2009) Reliability of Chip & PIN evidence in financial institute ing disputes. Digital Evid Electron Signat Law Rev 6:98–115Google Scholar