Advertisement

Payment in a Kiosk Centric Model with Mobile and Low Computational Power Devices

  • Jesús Téllez Isaac
  • José Sierra Camara
  • Antonio Izquierdo Manzanares
  • Mildrey Carbonell Castro
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3984)

Abstract

In this paper we present a protocol for a mobile payment system based on a Kiosk Centric Model (proposed by [2]) that employs symmetric-key operations which require low computational power. Our protocol is suitable for mobile payment systems where the customer cannot communicate with the issuer due to the absence of Internet access with her mobile device and the costs of implementing other mechanisms of communication between both of them are high. However, our proposal illustrates how a portable device equipped with a short range link (such Bluetooth, Infrared or Wi-Fi) and low computational power should be enough to interact with a vendor machine in order to buy goods in a secure way.

Keywords

Mobile Device Electronic Payment Cryptographic Operation Symmetric Cryptography Payment Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Al-Meaither, M.: Secure electronic payments for Islamic finance. PhD thesis, University of London (2004)Google Scholar
  2. 2.
    Chari, S., Kermani, P., Smith, S., Tassiulas, L.: Security issues in m-commerce: A usage-based taxonomy. In: Liu, J., Ye, Y. (eds.) E-Commerce Agents. LNCS (LNAI), vol. 2033, pp. 264–282. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Collberg, C., Carter, E., Debray, S., Huntwork, A., Kececioglu, J., Linn, C., Stepp, M.: Dynamic path-based software watermarking. In: ACMSIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, pp. 107–118. ACM, New York (2004)CrossRefGoogle Scholar
  4. 4.
    Ham, W., Choi, H., Xie, Y., Lee, M., Kim, K.: A secure one-way mobile payment system keeping low computation in mobile devices. In: WISA 2002. LNCS, pp. 287–301. Springer, Heidelberg (2002)Google Scholar
  5. 5.
    Kungpisdan, S.: A secure account-based mobile payment system protocol. In: ITCC 2004, International Conference on Information Technology: Coding and Computing, pp. 35–39. IEEE Computer Society, Los Alamitos (2004)CrossRefGoogle Scholar
  6. 6.
    Lei, Y., Chen, D., Jiang, Z.: Generating digital signatures on mobile devices. In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), pp. 532–535. IEEE Computer Society, Los Alamitos (2004)CrossRefGoogle Scholar
  7. 7.
    Sosonkin, M., Naumovich, G., Memon, N.: Obfuscation of design intent in object-oriented applications. In: 2003 ACM workshop on Digital rights management (DRM 2003), pp. 142–153. ACM Press, New York (2003)CrossRefGoogle Scholar
  8. 8.
    Visa International: 3-d secure mobile authentication scenarios version 1.0, [Online], Available, http://partnernetwork.visa.com/pf/3dsec/specifications.jsp (2002)
  9. 9.
    Zheng, X., Chen, D.: Study of mobile payments system. In: IEEE International Conference on Electronic Commerce, p. 24. IEEE Computer Society, Los Alamitos (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jesús Téllez Isaac
    • 1
  • José Sierra Camara
    • 1
  • Antonio Izquierdo Manzanares
    • 1
  • Mildrey Carbonell Castro
    • 1
  1. 1.Computer Science DeparmentUniversidad Carlos III de MadridLeganés (Madrid)Spain

Personalised recommendations