Call for Paper

CAE solicits original research papers for the July 2023 Edition. Last date of manuscript submission is June 30, 2023.

Read More

Secured Payment Protocol

Swapna Khandekar, Richard Kolk, Jingyuan Liang. Published in Security.

Communications on Applied Electronics
Year of Publication: 2017
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Swapna Khandekar, Richard Kolk, Jingyuan Liang
10.5120/cae2017652459

Swapna Khandekar, Richard Kolk and Jingyuan Liang. Secured Payment Protocol. Communications on Applied Electronics 6(6):5-10, January 2017. BibTeX

@article{10.5120/cae2017652459,
	author = {Swapna Khandekar and Richard Kolk and Jingyuan Liang},
	title = {Secured Payment Protocol},
	journal = {Communications on Applied Electronics},
	issue_date = {January 2017},
	volume = {6},
	number = {6},
	month = {Jan},
	year = {2017},
	issn = {2394-4714},
	pages = {5-10},
	numpages = {6},
	url = {http://www.caeaccess.org/archives/volume6/number6/695-2016652459},
	doi = {10.5120/cae2017652459},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In recent years, there is tremendous increase in usage of online payment applications. It is simple, quick and efficient mode of money transfer. From common man to business man, everyone is taking advantage of these applications to make transactions easy. However, with advancements in technology, security threats have increased drastically. In this research paper, secured payment protocol using self- certified key generation method has been suggested.

In order to understand, potential security threats in any payment protocol, one should have clear idea about possible vulnerabilities in it. Considering these vulnerabilities, authors have suggested preliminary version for new payment protocol. In this analysis, authors have used various methodologies like reverse engineering, study of security attacks. Also authors have proposed an energy-efficient model to improve energy efficiency for payment application.This study will be helpful in improving security in payment application and in growth of e – commerce bussiness.

References

  1. C. Kim, K. Changsu, T. Wang, S. Namchul, and K. Ki-Soo, “An empirical study of customers’ perceptions of security and trust in e-payment systems,” Electron. Commer. Res. Appl., vol. 9, no. 1, pp. 84–95, 2010.
  2. X. Hu, H. Xianpei, L. Wenli, and H. Qing, “Are Mobile Payment and Banking the Killer Apps for Mobile Commerce?,” in Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008.
  3. M. Niranjanamurthy and D. Chahar, “The study of e-commerce security issues and solutions,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 7, 2013.
  4. K. Thompson and T. Ken, “Reflections on trusting trust,” Commun. ACM, vol. 27, no. 8, pp. 761–763, 1984.
  5. A. K. Jain and S. Devendra, “Addressing Security and Privacy Risks in Mobile Applications,” IT Prof., vol. 14, no. 5, pp. 28–33, 2012.
  6. A. K. Ghosh and T. M. Swaminatha, “Software security and privacy risks in mobile e-commerce,” Commun. ACM, vol. 44, no. 2, pp. 51–57, 2001.
  7. R. A. Botha, S. M. Furnell, and N. L. Clarke, “From desktop to mobile: Examining the security experience,” Comput. Secur., vol. 28, no. 3–4, pp. 130–137, 2009.
  8. P. S. Maan and M. Sharma, “Social Engineering: A Partial Technical Attack,” International Journal of Computer Science, vol. 9, no. 2, 2012.
  9. B. Kraft, E. Mannes, and J. Moldow, “Security Research of a Social Payment App.” 2014.
  10. “About Square Cash.” [Online]. Available: https://squareup.com/help/us/en/article/5187-about-square-cash. [Accessed: 13-Oct-2015].
  11. Swapna Khandekar, Jingyuan Liang, Abdul Razaque, Fathi Amsaad and Musbah Abdulgader. “Security Research of a Social Payment App and Suggested Improvement”. Communications on Applied Electronics 4(5):14-21, February 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX
  12. K. Sahadevaiah, S. Kuncha, and P. R. P.V.G.D., “Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks,” Network Protocols and Algorithms, vol. 3, no. 4, 2011.
  13. W. Li, L. Wenmin, W. Qiaoyan, S. Qi, and J. Zhengping, “An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network,” Comput. Commun., vol. 35, no. 2, pp. 188–195, 2012.
  14. Isaac, Jesus Tellez, Jose Sierra Camara, Sherali Zeadally, and Joaquin Torres Marquez. "A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks." Computer Communications 31,  no. 10(2008):2478-2484.

Keywords

Key Generation, Social engineering attacks, Energy efficiency, Scalability, Security, Payment Protocol, Private Key, Public Key