1 Chapter 1 Introduction 1 Mobile Commerce

1 Chapter 1
Introduction 1
Mobile Commerce…………………………………………………………………….15

Mobile Payment………………………………………………………………………..16

Security and Limitations of Mobile Payment Systems…………………………. 18

Limitations of Wireless Environments………………………………………………18

characteristics of Wireless Network…………………………………………………..18

Security vs. Transaction Performance of Mobile Payment Systems………………19

Research Motivations of the Thesis………………………………………………………..19

Research Question of the Thesis………………………………………………………….20

Research Plan of the Thesis………………………………………………………..21
Objectives of the Thesis…………………………………………………………. 22
Organization of the Thesis………………………………………………………..22
2. Chapter 2.
Overview of mobile Payment………………………………………………………………..23

Requirements for a Practical and Secure Mobile Payment System ……………..23

General Electronic Payment Model…………………………………………………24

Electronic Payment Systems………………………………………………………26

Account-Based Electronic Payment Systems……………………………………..26

Token-Based Electronic Payment Systems 27

Enabling Mobile Payment 29

Proxy-Based Framework 30

Agent-Based Framework 32

Non Proxy-Based Framework 35

Comparison of Existing Frameworks for Mobile Payment……………………… 39

Integrated Mobile Payment Framework43Securing Transfer of Account information During Payment transactions……………………………………………………………….…40

Rubin et al.’s Scheme…………,,,,,,,,,,,,,………………………………………….…47

Li et al.’s Scheme…………………………………………………………………….44

A Possible Solution to Secure Account Information Transfer 44

Summary………………. 45
3. Chapter 3
Formal Mobile Payment Model 51

a. Electronic Payment 46
b.
i. Electronic Payment System 46
ii. Engaging Parties 47
iii. Communication Environment 49
iv. Payment Token 50
v. Payment Information 50
vi. Payment Transaction 51
vii. Goals of Engaging Parties for Payment Transactions . .………………………………………………… 52
viii. Party’s Requirements for Payment Transactions 53
ix. Transaction Security 56
x. Trust Relationships among Engaging Parties 57
xi. Transaction Performance 57
xii. Practical and Secure Mobile Payment System 59
xiii. Wireless vs. Fixed Environments 59
xiv. Cryptographic Operations 59
xv. Symmetric vs. Asymmetric Cryptography for Payment Transactions………………………………………………..61
c. Fixed-network Payment Protocols in Wireless Environments…… 62
d. Analyzing a Payment System Based on The Proposed Model.. …62
e. 3.4 Summary……………………………………………………63
4 Chapter 4
A Framework for Practical and Secure Mobile Payment 64
a. Evaluation of Existing Frameworks 64
i. Agent-Based Framework 66
ii. Details of the Proposed Framework 67
iii. Comparing the Proposed Framework to Existing Frame- works 69
b. Discussions 72
i. Trust Relationships among Engaging Parties 72
ii. Transaction Security Properties 73
iii. Client Privacy 75
iv. Computational Load 75
v. Compatibility with Existing Payment Infrastructure . . . … 76
c. Summary 76
5 Chapter 5
Fundamental Concepts Of Our Mobile Transaction Processing System and security……………………………………………………………..78
a. Enhancing Security of Symmetric Cryptography 78
b. The Proposed Cryptographic Technique 79
c. Notations 80
d. KSLv1 Protocol 81
i. Initial Assumptions 82
ii. Key Generation Techniques 82
e. Analysis and Discussions 83
i. Goals of Engaging Parties for Payment Transactions . . . …………………………………………………..83
ii. Transaction Security Properties 84
iii. Failure Recovery 84
iv. Trust Relationships among Engaging Parties 85
f. Performance Analysis………………………………………………………………85Applying KSLv1 and KSLv2 to the Proposed Mobile Payment Framework…………………………………………………………..89
g. Summary 90
6 Validation of KSLv1 Protocol 92
a. Environment Settings 92
b. Chosen Cryptographic Operations 129System Design 94
i. KSL Wallet Design 97
ii. Merchant Design 97
iii. Payment Gateway Design 99
c. Implementation 100
i. Merchant Registration 100
ii. Making Payment 102
d. Results and Discussions 104
i. Transaction Time 105
ii. Storing Keys 106
iii. Application Size 107
e. Summary 107
7. Chapter
Current Stage of the Implementation of the Prototype of Mobile Transaction Processing System…………..………………………………………………….108
Kungpisdan et al.’s Logic………………………………………………. 112
f. Accountability vs. Protocols for Wireless Networks 112
g. The Proposed Accountability Logic 116
h. Analysis of the Proposed SET Framework on Accountability. . Goals of the Analysis 120
Initial Assumptions. 129
Party’s Requirements for Payment Transactions of iKP Protocol ………………..129
Summary…………………. 129
Chapter 8.
Evaluates The Research Results …………..………131
The Proposed Micropayment Protocol 135
Overview of the Proposed Protocol 136
Initial Assumptions …………………………………………………………………136
Setup Protocol………………….. 136
Payment Initialization Protocol 140
Payment Protocol…………….. 140
Extra Credit Request Protocol 140
Coupon Cancellation Protocol 142
Coin Return Protocol 143
Extending the Proposed Protocol to Postpaid Micropayment . ………………144
Payment Initialization Protocol 144
Payment Clearing Protocol 144
Analysis and Discussions 145
Transaction Security Properties 145
Dispute Resolution………….. 146
Private Information …………………………………………………………………146
Secret Keys……………………… 147
Trust Relationships among Engaging Parties 147
Performance Analysis 147
Summary……………… 153
Bibliography………………………………………………………… 154

B Publications……………………………………………………… 159