Skip to main content

2017 | OriginalPaper | Buchkapitel

5. Future Challenges and Opportunities

verfasst von : Jesús Téllez, Sherali Zeadally

Erschienen in: Mobile Payment Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we some future security challenges that should be addressed by researchers and designers of mobile payment systems in order to provide a secure environment for ubiquitous mobile commerce. We also highlight some of the challenges faced by users of mobile payment systems which must be understood by designers of such systems to maximize the overall user satisfaction. Finally, we also analyze some alternative cryptographic schemes in the design of mobile payments systems along with opportunities offered by other technologies such as Mobile Cloud computing (MCC) and Vehicular Ad hoc NETworks (VANETs).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
EMV is a technical standard for smart payments and for payment terminals and automated teller machines.
 
Literatur
8.
Zurück zum Zitat K. Aoki, E.J. Downes, An analysis of young people’s use of and attitudes toward cell phones. Telematics Inform. 20(4), 349–364 (2003)CrossRef K. Aoki, E.J. Downes, An analysis of young people’s use of and attitudes toward cell phones. Telematics Inform. 20(4), 349–364 (2003)CrossRef
15.
Zurück zum Zitat N. Ben-Asher, H. Sieger, A. Ben-Oved, N. Kirschnick, J. Meyer, S. Möller, On the need for different security methods on mobile phones, in Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2011) (2011) N. Ben-Asher, H. Sieger, A. Ben-Oved, N. Kirschnick, J. Meyer, S. Möller, On the need for different security methods on mobile phones, in Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2011) (2011)
17.
Zurück zum Zitat S. Bitam, A. Mellouk, S. Zeadally, VANET-cloud: a generic cloud computing model for vehicular ad-hoc networks. IEEE Wirel. Commun. Mag. 2(1), 96–102 (2015)CrossRef S. Bitam, A. Mellouk, S. Zeadally, VANET-cloud: a generic cloud computing model for vehicular ad-hoc networks. IEEE Wirel. Commun. Mag. 2(1), 96–102 (2015)CrossRef
24.
Zurück zum Zitat C.-L. Chen, W.-C. Tsai, Using a stored-value card to provide an added-value service of payment protocol in vanet, in Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2013) (2013), pp. 660–665 C.-L. Chen, W.-C. Tsai, Using a stored-value card to provide an added-value service of payment protocol in vanet, in Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2013) (2013), pp. 660–665
35.
Zurück zum Zitat H.T. Dinh, C. Lee, D. Niyato, P. Wang, A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2013)CrossRef H.T. Dinh, C. Lee, D. Niyato, P. Wang, A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2013)CrossRef
48.
Zurück zum Zitat J. Gao, A. Küpper, Emerging technologies for mobile commerce. J. Theor. Appl. Electron. Commer. Res. 1(1), Editorial (2006) J. Gao, A. Küpper, Emerging technologies for mobile commerce. J. Theor. Appl. Electron. Commer. Res. 1(1), Editorial (2006)
55.
Zurück zum Zitat J.A. Guerrero-Ibáñez, C. Flores-Cortés, S. Zeadally, Vehicular ad-hoc networks (VANETs): architecture, protocols and applications, in Next-Generation Wireless Technologies: 4G and Beyond, ed. by N. Chilamkurti, S. Zeadally, H. Chaouchi (Springer, London, 2013), pp. 49–70. ISBN:978-1-4471-5164-7CrossRef J.A. Guerrero-Ibáñez, C. Flores-Cortés, S. Zeadally, Vehicular ad-hoc networks (VANETs): architecture, protocols and applications, in Next-Generation Wireless Technologies: 4G and Beyond, ed. by N. Chilamkurti, S. Zeadally, H. Chaouchi (Springer, London, 2013), pp. 49–70. ISBN:978-1-4471-5164-7CrossRef
66.
Zurück zum Zitat S. Hillman, C. Neustaedter, E. Oduor, C. Pang, Mobile payment systems in north america: user challenges & successes, in Proceedings of the Extended Abstracts of the 32nd Annual ACM Conference on Human Factors in Computing Systems (CHI EA 2014) (2014), pp. 1909–1914 S. Hillman, C. Neustaedter, E. Oduor, C. Pang, Mobile payment systems in north america: user challenges & successes, in Proceedings of the Extended Abstracts of the 32nd Annual ACM Conference on Human Factors in Computing Systems (CHI EA 2014) (2014), pp. 1909–1914
69.
Zurück zum Zitat R.-J. Hwang, F.-F. Su, L.-S. Huang, Fast firmware implementation of RSA-like security protocol for mobile devices. Wirel. Pers. Commun. 42(2), 213–223 (2007)CrossRef R.-J. Hwang, F.-F. Su, L.-S. Huang, Fast firmware implementation of RSA-like security protocol for mobile devices. Wirel. Pers. Commun. 42(2), 213–223 (2007)CrossRef
70.
Zurück zum Zitat J.T. Isaac, J.S. Cámara, An anonymous account-based mobile payment protocol for a restricted connectivity scenario, in 18th International Workshop on Database and Expert Systems Applications (DEXA 2007) (2007), pp. 688–692 J.T. Isaac, J.S. Cámara, An anonymous account-based mobile payment protocol for a restricted connectivity scenario, in 18th International Workshop on Database and Expert Systems Applications (DEXA 2007) (2007), pp. 688–692
73.
Zurück zum Zitat J.T. Isaac, J.S. Cámara, S. Zeadally, J.T. Márquez, A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. Comput. Commun. 31(10), 2478–2484 (2008)CrossRef J.T. Isaac, J.S. Cámara, S. Zeadally, J.T. Márquez, A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. Comput. Commun. 31(10), 2478–2484 (2008)CrossRef
74.
Zurück zum Zitat J.T. Isaac, S. Zeadally, An anonymous secure payment protocol in a payment gateway centric model. Procedia CS 10, 758–765 (2012) J.T. Isaac, S. Zeadally, An anonymous secure payment protocol in a payment gateway centric model. Procedia CS 10, 758–765 (2012)
76.
Zurück zum Zitat J.T. Isaac, S. Zeadally, Secure mobile payments. IT Professional 16(3), 36–43 (2014, in press) J.T. Isaac, S. Zeadally, Secure mobile payments. IT Professional 16(3), 36–43 (2014, in press)
77.
Zurück zum Zitat J.T. Isaac, S. Zeadally, J.S. Camara, Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks. Electron. Commer. Res. 10(2), 209–233 (2010)CrossRefMATH J.T. Isaac, S. Zeadally, J.S. Camara, Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks. Electron. Commer. Res. 10(2), 209–233 (2010)CrossRefMATH
78.
Zurück zum Zitat J.T. Isaac, S. Zeadally, J.S. Camara, A lightweight secure mobile payment protocol for vehicular ad-hoc networks (vanets). Electron. Commer. Res. 12(1), 97–123 (2012)CrossRef J.T. Isaac, S. Zeadally, J.S. Camara, A lightweight secure mobile payment protocol for vehicular ad-hoc networks (vanets). Electron. Commer. Res. 12(1), 97–123 (2012)CrossRef
87.
Zurück zum Zitat P. Kieseberg, M. Leithner, M. Mulazzani, L. Munroe, S. Schrittwieser, M. Sinha, E. Weippl, QR code security, in Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2010) (2010), pp. 430–435 P. Kieseberg, M. Leithner, M. Mulazzani, L. Munroe, S. Schrittwieser, M. Sinha, E. Weippl, QR code security, in Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2010) (2010), pp. 430–435
89.
Zurück zum Zitat K. Krombholz, P. Frühwirt, P. Kieseberg, I. Kapsalis, M. Huber, E. Weippl, QR code security: a survey of attacks and challenges for usable security, in Proceedings of Human Aspects of Information Security, Privacy, and Trust – Second International Conference, HAS 2014, Held as Part of HCI International 2014 (2014), pp. 79–90 K. Krombholz, P. Frühwirt, P. Kieseberg, I. Kapsalis, M. Huber, E. Weippl, QR code security: a survey of attacks and challenges for usable security, in Proceedings of Human Aspects of Information Security, Privacy, and Trust – Second International Conference, HAS 2014, Held as Part of HCI International 2014 (2014), pp. 79–90
102.
Zurück zum Zitat Q. Li, G. Clark, Mobile security: a look ahead. IEEE Secur. Priv. 11(1), 78–81 (2013)CrossRef Q. Li, G. Clark, Mobile security: a look ahead. IEEE Secur. Priv. 11(1), 78–81 (2013)CrossRef
104.
Zurück zum Zitat W. Li, Q. Wen, Q. Su, Z. Jin, An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput. Commun. 35(2), 188–195 (2012)CrossRef W. Li, Q. Wen, Q. Su, Z. Jin, An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput. Commun. 35(2), 188–195 (2012)CrossRef
121.
Zurück zum Zitat E.A. Morse, V. Raval, PCI DSS: payment card industry data security standards in context. Comput. Law Secur. Rev. 24(6), 540–554 (2008)CrossRef E.A. Morse, V. Raval, PCI DSS: payment card industry data security standards in context. Comput. Law Secur. Rev. 24(6), 540–554 (2008)CrossRef
143.
Zurück zum Zitat P. Pourghomi, G. Ghinea, Ecosystem scenarios for cloud-based NFC payments, in Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems (MEDES 2013) (2013), pp. 113–118 P. Pourghomi, G. Ghinea, Ecosystem scenarios for cloud-based NFC payments, in Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems (MEDES 2013) (2013), pp. 113–118
158.
Zurück zum Zitat S. Schwiderski-Grosche, H. Knospe, Secure mobile commerce. Electron. Commun. Eng. J. 14(5), 228–238 (2002)CrossRef S. Schwiderski-Grosche, H. Knospe, Secure mobile commerce. Electron. Commun. Eng. J. 14(5), 228–238 (2002)CrossRef
159.
Zurück zum Zitat V.C. Sekhar, M. Sarvabhatla, A secure account-based mobile payment protocol with public key cryptography. ACEEE Int. J. Netw. Secur. 3(1), 5–9 (2012) V.C. Sekhar, M. Sarvabhatla, A secure account-based mobile payment protocol with public key cryptography. ACEEE Int. J. Netw. Secur. 3(1), 5–9 (2012)
165.
Zurück zum Zitat E.L. Slade, M.D. Williams, Y.K. Dwivedi, Mobile payment adoption: classification and review of the extant literature. Mark. Rev. 13(2), 167–190 (2013)CrossRef E.L. Slade, M.D. Williams, Y.K. Dwivedi, Mobile payment adoption: classification and review of the extant literature. Mark. Rev. 13(2), 167–190 (2013)CrossRef
169.
Zurück zum Zitat A.K. Sood, S. Zeadally, Drive-by download attacks: a comparative study of browser exploit packs features and attack techniques. IEEE IT Prof. (2016, in press) A.K. Sood, S. Zeadally, Drive-by download attacks: a comparative study of browser exploit packs features and attack techniques. IEEE IT Prof. (2016, in press)
174.
Zurück zum Zitat J. Téllez, J. Sierra, A. Izquierdo, M. Carbonell, Anonymous payment in a kiosk centric model using digital signature scheme with message recovery and low computational power devices. J. Theor. Appl. Electron. Commer. Res. 1(2), 1–11 (2006) J. Téllez, J. Sierra, A. Izquierdo, M. Carbonell, Anonymous payment in a kiosk centric model using digital signature scheme with message recovery and low computational power devices. J. Theor. Appl. Electron. Commer. Res. 1(2), 1–11 (2006)
189.
Zurück zum Zitat M. Whaiduzzaman, M. Sookhak, A. Gani, R. Buyya, A survey on vehicular cloud computing. J. Netw. Comput. Appl. 40, 325–344 (2014)CrossRef M. Whaiduzzaman, M. Sookhak, A. Gani, R. Buyya, A survey on vehicular cloud computing. J. Netw. Comput. Appl. 40, 325–344 (2014)CrossRef
194.
Zurück zum Zitat S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, A. Hassan, Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4), 243–346 (2012)CrossRef S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, A. Hassan, Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4), 243–346 (2012)CrossRef
196.
Zurück zum Zitat R. Zhang, J.Q. Chen, C.A.J. Lee, Mobile commerce and consumer privacy concerns. J. Comput. Inf. Syst. 53(4), 31–38 (2013) R. Zhang, J.Q. Chen, C.A.J. Lee, Mobile commerce and consumer privacy concerns. J. Comput. Inf. Syst. 53(4), 31–38 (2013)
Metadaten
Titel
Future Challenges and Opportunities
verfasst von
Jesús Téllez
Sherali Zeadally
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-23033-7_5

Premium Partner