Abstract
In this paper we present a protocol for a mobile payment system based on a Kiosk Centric Model (proposed by [2]) that employs symmetric-key operations which require low computational power. Our protocol is suitable for mobile payment systems where the customer cannot communicate with the issuer due to the absence of Internet access with her mobile device and the costs of implementing other mechanisms of communication between both of them are high. However, our proposal illustrates how a portable device equipped with a short range link (such Bluetooth, Infrared or Wi-Fi) and low computational power should be enough to interact with a vendor machine in order to buy goods in a secure way.
This work was partially supported by ASPECTS-M Project (Reference Models for Secure Architectures in Mobile Electronic Payments), CICYT-2004.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Al-Meaither, M.: Secure electronic payments for Islamic finance. PhD thesis, University of London (2004)
Chari, S., Kermani, P., Smith, S., Tassiulas, L.: Security issues in m-commerce: A usage-based taxonomy. In: Liu, J., Ye, Y. (eds.) E-Commerce Agents. LNCS (LNAI), vol. 2033, pp. 264–282. Springer, Heidelberg (2001)
Collberg, C., Carter, E., Debray, S., Huntwork, A., Kececioglu, J., Linn, C., Stepp, M.: Dynamic path-based software watermarking. In: ACMSIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, pp. 107–118. ACM, New York (2004)
Ham, W., Choi, H., Xie, Y., Lee, M., Kim, K.: A secure one-way mobile payment system keeping low computation in mobile devices. In: WISA 2002. LNCS, pp. 287–301. Springer, Heidelberg (2002)
Kungpisdan, S.: A secure account-based mobile payment system protocol. In: ITCC 2004, International Conference on Information Technology: Coding and Computing, pp. 35–39. IEEE Computer Society, Los Alamitos (2004)
Lei, Y., Chen, D., Jiang, Z.: Generating digital signatures on mobile devices. In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), pp. 532–535. IEEE Computer Society, Los Alamitos (2004)
Sosonkin, M., Naumovich, G., Memon, N.: Obfuscation of design intent in object-oriented applications. In: 2003 ACM workshop on Digital rights management (DRM 2003), pp. 142–153. ACM Press, New York (2003)
Visa International: 3-d secure mobile authentication scenarios version 1.0, [Online], Available, http://partnernetwork.visa.com/pf/3dsec/specifications.jsp (2002)
Zheng, X., Chen, D.: Study of mobile payments system. In: IEEE International Conference on Electronic Commerce, p. 24. IEEE Computer Society, Los Alamitos (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Isaac, J.T., Camara, J.S., Manzanares, A.I., Castro, M.C. (2006). Payment in a Kiosk Centric Model with Mobile and Low Computational Power Devices. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3984. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751649_88
Download citation
DOI: https://doi.org/10.1007/11751649_88
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34079-9
Online ISBN: 978-3-540-34080-5
eBook Packages: Computer ScienceComputer Science (R0)