scholarly journals An End-To-End Secure Mobile Payment System Using Public Key Infrastructure System

2012 ◽  
Vol 6 (3) ◽  
pp. 395-409
Author(s):  
S. Britto ◽  
R. Kumar ◽  
S. Albert Rabara
2019 ◽  
Vol 48 (1) ◽  
pp. 14-22
Author(s):  
Krishna Prakasha ◽  
Balachandra Muniyal ◽  
Vasundhara Acharya

Purpose The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism. Design/methodology/approach One of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm. Findings The time consumed for the proposed research work shows that it is practical and acceptable. Originality/value The proposed research work is an efficient and enhanced user authentication mechanism.


2008 ◽  
Vol 7 (2) ◽  
pp. 214-231 ◽  
Author(s):  
Marko Hassinen ◽  
Konstantin Hyppönen ◽  
Elena Trichina

Author(s):  
Gyõzõ Gódor ◽  
Zoltán Faigl ◽  
Máté Szalay

The widespread usage of new telecommunication technologies implies the demand on payment via Internet since the ’90s. First, these solutions were applied only by pioneer users, while average men still chose traditional payment methods such as payment by cash, cheque, or bank transfer. In the latest decade, the notable improvement of mobile communications allowed the provision of customized services. A new payment method has appeared which is called mobilepayment. Consequently, increasing number of banks provide access to their services via mobile equipment. Reliable network security is an essential prerequisite for the expansion of the rapidly growing world of electronic payment. Public key infrastructure (PKI) offers the capabilities needed to provide this security. Establishing trust in a wireless public key infrastructure (WPKI) is crucial for the success of applications that will exploit the opportunities created by handheld wireless devices. This trust is based on the reliability of the technology but also on a carefully implemented system of laws, policies, standards, and procedures. The development of trusted electronic transactions is motivated by legislation. The EU adopted a legislative framework to guarantee the security and acceptance of electronic signatures in 1999. The U.S. adopted legislation for the recognition of electronic signatures in national and global trade in June 2000 (Sievers, 2000). This article deals with mobile payment and mobile banking services and focuses particularly on the mobile side of the system. First, we introduce the technological background necessary for developing m-services, and we define the m-payment reference model. After that, the differences between chip-card and software based implementations will be presented. Finally, we conclude the article and summarize the main terms used in the article.


Author(s):  
Alexander Papageorgiou ◽  
Antonis Mygiakis ◽  
Konstantinos Loupos ◽  
Thomas Krousarlis

2012 ◽  
Vol 263-266 ◽  
pp. 2785-2791
Author(s):  
Yun Seok Lee ◽  
Eun Kim ◽  
Sung Jin Kim ◽  
Min Soo Jung

Today, users can access in the network environments anywhere and anytime through a mobile devices. These environments also can be able to perform mobile payment through these devices anytime and anywhere. Especially, in case of a recently being spotlighted NFC can operate high-strength crypto algorithms unlike the existing RFID. And also, this supports the technology as ‘Tag to Device’, ‘Device to Device’. Recently, various studies are being actively researched about the mobile payment system through these NFC devices. In case of existing papers are performed payment steps using most of a Public Key(PKI) or Symmetric-Key based heavy crypto algorithms, therefore, can be slow than how to use a hash-function and XOR. And also, environment construction of tracing, storing and managing about payment information is not strong. In this paper, to solve these problems, we were able to improve on performing time by lightweight authentication method using a hash function and XOR algorithms. And also, we designed that data about the payment information safe can be stored into the USIM File System. Thus, because of this method, we propose a scheme that can be traced about the deny payment.


Sign in / Sign up

Export Citation Format

Share Document