Anonymous proximity mobile payment (APMP) Article First Online: 17 November 2012 Received: 29 August 2012 Accepted: 29 October 2012 DOI:
Cite this article as: Almuairfi, S., Veeraraghavan, P., Chilamkurti, N. et al. Peer-to-Peer Netw. Appl. (2014) 7: 620. doi:10.1007/s12083-012-0183-1 Abstract
The growth of wireless networks and the increasing popularity of mobile devices present an significant opportunity to empower them as a payment device. Unfortunately, several problems hinder the widespread acceptance of mobile payments, for example, privacy protection and user anonymity. Measures to ensure anonymity in payment systems must be considered as an important factor in privacy and system acceptance. We propose a new measure to enhance the level of anonymity in mobile payments where users can customize their anonymity, according to their personal preferences. We rely on IPAS (Implicit Password Authentication System) (Almuairfi et al.
) for dispute resolution to support our proposed idea. 2011 Keywords Anonymity Near field communication Mobile payment
“This work supported in part by the Soonchunhyang university research fund”
Almuairfi S, Veeraraghavan P, Chilamkurti N (2011) IPAS: Implicit Password Authentication System. Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.
Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2) February.
Reed M, Syverson P, Goldschlag D (1998) Anonymous connections and onion routing. IEEE J Sel Areas Commun 16(4):482–494
CrossRef Google Scholar
Tan Soo F, Leau Yu B et al (2008) Privacy in new mobile payment protocol. World Academy of Science, Engineering and Technology 47, 2008.
Greenhill D (2011) Mobile commerce daily: Understanding the potential of in-store mobile media. March 29, 2011.
Copyright Wikipedia (2012) Payment card.
. Accessed 12 January 2012.
Santolalla O (2008) Mobile payment as key factor for mobile commerce success.
Martinez-Pelaez R, Rico-Novella F et al (2008) Mobile payment protocol for micropayments: withdrawal and payment anonymous. New Technologies, Mobility and Security, 2008. NTMS ‘08.
Wan Z, Wang Q (2010) Secure mobile payment based on Super SET protocol. Advanced Computer Control (ICACC), 2nd Int. Conf. IEEE
Krawetz N (2006–2007) Point-of-sale vulnerabilities. Copyright (2006–2007) Hacker Factor Solutions, White Paper,
. Accessed 12 November 2010.
Murdoch SJ, Drimer S, Anderson R, Bond M (2010) “Chip and PIN is Broken,” sp, pp.433-446, 2010 IEEE Symposium on Security and Privacy.
Schmidt AU, Kuntze N et al (2008) On the deployment of mobile trusted modules. Wireless Communications and Networking Conference, WCNC 2008. IEEE.
Murdoch SJ (2009) Reliability of Chip & PIN evidence in financial institute ing disputes. Digital Evid Electron Signat Law Rev 6:98–115
Google Scholar Copyright information
© Springer Science+Business Media New York 2012