Skip to main content

2017 | Buch

Mobile Payment Systems

Secure Network Architectures and Protocols


Über dieses Buch

This important text/reference presents the latest research and developments in the field of mobile payment systems (MPS), covering issues of mobile device security, architectures and models for MPS, and transaction security in MPS. Topics and features: introduces the fundamental concepts in MPS, discussing the benefits and disadvantages of such systems, and the entities that underpin them; reviews the mobile devices and operating systems currently available on the market, describing how to identify and avoid security threats to such devices; examines the different models for mobile payments, presenting a classification based on their core features; presents a summary of the most commonly used cryptography schemes for secure communications; outlines the key challenges in MPS, covering security for ubiquitous mobile commerce and usability issues; highlights the opportunities offered by mobile cloud computing and vehicular ad hoc networks in the design and development of MPS.


Chapter 1. Introduction
The last decade has witnessed the emergence of new payment systems which enable financial transactions to be made securely from one organization or individual to another over a mobile network called Mobile Payment System which offers attractive opportunities to financial institutions, merchants, and end-users. This chapter introduces the fundamental concepts that underpin mobile payment systems: we introduce the concept of electronic money (including characteristics, advantages and disadvantages) to understand the evolution from traditional money to electronic money. We also present an overview of mobile commerce, mobile payment characteristics, current mobile payment methods, mobile payment stakeholders, and technologies for mobile payments. We also discuss the benefits and drawbacks of mobile payment systems and the entities that comprise such systems.
Jesús Téllez, Sherali Zeadally
Chapter 2. Mobile Device Security
In this chapter, we review several mobile devices available on the market that allow users to support different applications’ requirements and needs. Next, we discuss popular operating systems for current consumer-type mobile devices. This chapter also highlights some important differences between mobile device security and Personal Computer (PC) security to improve the understanding of mobile device security. We identify various types of threats against mobile payment systems, the resources to be protected, attackers’ characteristics, and finally we present a threat model. This chapter also describe recent popular mobile malware types. We present two mechanisms that can be used to mitigate different types of threats for mobile devices such as smartphones.
Jesús Téllez, Sherali Zeadally
Chapter 3. Architectures and Models for Mobile Payment Systems
Many mobile payment models have been proposed by researchers in the last decade. This chapter classify them based on their specific features to enable readers to stay up-to-date with state-of-the-art mobile payment models. The core features used in our classification include: (i) micro-payments, (ii) cryptographic technique (asymmetric cryptographic and symmetric cryptographic), (iii) technology used such as short message service, biometric technology, Radio-Frequency IDentification (RFID) technology, Near Field Communication (NFC), 2-D barcode technology, and peer-to-peer technology, (iv) Session Initiation Protocol (SIP), communication restriction, (v) mobile agent technology, and (vi) wireless application protocol.
Jesús Téllez, Sherali Zeadally
Chapter 4. Security in Mobile Payment Systems
Without the assurance that the information exchanged during a payment transaction is secure, the entities involved in a mobile payment system will not trust mobile commerce. This chapter presents a brief review of some of the most commonly used cryptography schemes for secure communications among the parties of typical mobile payment systems. This chapter also discusses some of the issues that make the design of secure mobile payment systems a major challenge.
Jesús Téllez, Sherali Zeadally
Chapter 5. Future Challenges and Opportunities
In this chapter, we some future security challenges that should be addressed by researchers and designers of mobile payment systems in order to provide a secure environment for ubiquitous mobile commerce. We also highlight some of the challenges faced by users of mobile payment systems which must be understood by designers of such systems to maximize the overall user satisfaction. Finally, we also analyze some alternative cryptographic schemes in the design of mobile payments systems along with opportunities offered by other technologies such as Mobile Cloud computing (MCC) and Vehicular Ad hoc NETworks (VANETs).
Jesús Téllez, Sherali Zeadally
Mobile Payment Systems
verfasst von
Prof. Jesús Téllez
Prof. Sherali Zeadally
Electronic ISBN
Print ISBN

Premium Partner