Advertisement

Secure, Transparent and Uniform Mobile Money for Internet-Underserved Areas Using Sporadically-Synchronized Blockchain

Conference paper
  • 304 Downloads
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 275)

Abstract

This position paper presents the design and outline of the implementation of a mobile money scheme that adapts to the realities of Internet-underserved Areas while exploiting the benefits of Internet protocols. In particular, we implement security and transparency in mobile money transactions using a lightweight permissioned Blockchain infrastructure. Nevertheless, due to network latency and potential connectivity issues, the design of the platform accepts semi-offline transactions: it leverages USSD, a 2nd Generation mobile protocol, only as a back-up channel to force writing of offline transactions to the permissioned ledger and ensure smooth synchronization of the blockchain.

Keywords

Mobile money Blockchain ICT4D Internet-underserved areas 

References

  1. 1.
    Telecoms in Kenya: A new East Africa campaign. https://goo.gl/H3cFyR
  2. 2.
    Making mobile money pay in Africa (2017). https://goo.gl/vl1WDi
  3. 3.
    GSM Association: State of the industry report on mobile money (2015). https://goo.gl/xdJj79
  4. 4.
    Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better — how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399–414. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-32946-3_29CrossRefGoogle Scholar
  5. 5.
    Central Bank of Kenya: Launching of the financial geospatial mapping survey (2015). https://goo.gl/MF9rUU
  6. 6.
    Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, Boston (1983).  https://doi.org/10.1007/978-1-4757-0602-4_18CrossRefGoogle Scholar
  7. 7.
  8. 8.
    Ericsson: Ericsson report: Mobile internet use doubling year-on-year in sub-Sahara Africa. https://goo.gl/0iITaZ
  9. 9.
    Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014).  https://doi.org/10.1007/978-3-662-45472-5_28CrossRefGoogle Scholar
  10. 10.
    Karame, G.O., Androulaki, E., Capkun, S.: Double-spending fast payments in bitcoin. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 906–917. ACM (2012)Google Scholar
  11. 11.
    Kroll, J.A., Davey, I.C., Felten, E.W.: The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: Proceedings of WEIS, vol. 2013, p. 11 (2013)Google Scholar
  12. 12.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  13. 13.
    Ouattara, H.F., Ahmat, D., Ouedraogo, F.T., Bissyande, T.F., Sie, O.: Blockchain consensus protocols - towards a review of practical constraints for implementation in developing countries. In: EAI International Conference on e-Infrastructures and e-Services for Developing Countries (AFRICOMM) (2017)Google Scholar
  14. 14.
    Parker, S.R.: Bitcoin vs electronic money, CGAP report (2014). https://goo.gl/po06th
  15. 15.
    The Economist Intelligence Unit: Mobile money in Africa: Promise and perils. https://goo.gl/DUI47i
  16. 16.
    World Bank Development Research Group, the Better Than Cash Alliance, and the Bill & Melinda Gates Foundation: The opportunities of digitizing payments (2014). https://goo.gl/wTlECK

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.SnT, University of LuxembourgLuxembourg CityLuxembourg
  2. 2.Université Ouaga I Pr. Joseph Ki-ZerboOuagadougouBurkina Faso
  3. 3.Université Virtuelle du TchadN’DjamenaTchad

Personalised recommendations