Skip to main content

Future Challenges and Opportunities

  • Chapter
  • First Online:
Mobile Payment Systems

Part of the book series: Computer Communications and Networks ((CCN))

  • 2332 Accesses

Abstract

In this chapter, we some future security challenges that should be addressed by researchers and designers of mobile payment systems in order to provide a secure environment for ubiquitous mobile commerce. We also highlight some of the challenges faced by users of mobile payment systems which must be understood by designers of such systems to maximize the overall user satisfaction. Finally, we also analyze some alternative cryptographic schemes in the design of mobile payments systems along with opportunities offered by other technologies such as Mobile Cloud computing (MCC) and Vehicular Ad hoc NETworks (VANETs).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    EMV is a technical standard for smart payments and for payment terminals and automated teller machines.

Bibliography

  1. K. Aoki, E.J. Downes, An analysis of young people’s use of and attitudes toward cell phones. Telematics Inform. 20(4), 349–364 (2003)

    Article  Google Scholar 

  2. N. Ben-Asher, H. Sieger, A. Ben-Oved, N. Kirschnick, J. Meyer, S. Möller, On the need for different security methods on mobile phones, in Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2011) (2011)

    Google Scholar 

  3. S. Bitam, A. Mellouk, S. Zeadally, VANET-cloud: a generic cloud computing model for vehicular ad-hoc networks. IEEE Wirel. Commun. Mag. 2(1), 96–102 (2015)

    Article  Google Scholar 

  4. C.-L. Chen, W.-C. Tsai, Using a stored-value card to provide an added-value service of payment protocol in vanet, in Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2013) (2013), pp. 660–665

    Google Scholar 

  5. C. Cox, S. Sanchez, Transforming the customer experience: the promise of mobile wallets. Technical report, First Data Thought Leadership (2013), http://tex.stackexchange.com/questions/5957/bibtex-entry-for-white-papers-and-technical-reports

    Google Scholar 

  6. M. Crowe, E. Tavilla, Mobile phone technology: “smarter” than we thought (2012), http://www.bostonfed.org/bankinfo/payment-strategies/index.htm. Last accessed 30 Sept 2013

  7. A. Dedeche, F. Liu, M. Le, S. Lajami, Emergent BYOD security challenges and mitigation strategy (2013), https://minerva-access.unimelb.edu.au/bitstream/handle/11343/33340/300297_2013_Lajami_Strategy.pdf?sequence=1. Last accessed Aug 2014

  8. H.T. Dinh, C. Lee, D. Niyato, P. Wang, A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2013)

    Article  Google Scholar 

  9. J. Gao, A. Küpper, Emerging technologies for mobile commerce. J. Theor. Appl. Electron. Commer. Res. 1(1), Editorial (2006)

    Google Scholar 

  10. J.A. Guerrero-Ibáñez, C. Flores-Cortés, S. Zeadally, Vehicular ad-hoc networks (VANETs): architecture, protocols and applications, in Next-Generation Wireless Technologies: 4G and Beyond, ed. by N. Chilamkurti, S. Zeadally, H. Chaouchi (Springer, London, 2013), pp. 49–70. ISBN:978-1-4471-5164-7

    Chapter  Google Scholar 

  11. S. Hillman, C. Neustaedter, E. Oduor, C. Pang, Mobile payment systems in north america: user challenges & successes, in Proceedings of the Extended Abstracts of the 32nd Annual ACM Conference on Human Factors in Computing Systems (CHI EA 2014) (2014), pp. 1909–1914

    Google Scholar 

  12. R.-J. Hwang, F.-F. Su, L.-S. Huang, Fast firmware implementation of RSA-like security protocol for mobile devices. Wirel. Pers. Commun. 42(2), 213–223 (2007)

    Article  Google Scholar 

  13. J.T. Isaac, J.S. Cámara, An anonymous account-based mobile payment protocol for a restricted connectivity scenario, in 18th International Workshop on Database and Expert Systems Applications (DEXA 2007) (2007), pp. 688–692

    Google Scholar 

  14. J.T. Isaac, J.S. Cámara, S. Zeadally, J.T. Márquez, A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. Comput. Commun. 31(10), 2478–2484 (2008)

    Article  Google Scholar 

  15. J.T. Isaac, S. Zeadally, An anonymous secure payment protocol in a payment gateway centric model. Procedia CS 10, 758–765 (2012)

    Google Scholar 

  16. J.T. Isaac, S. Zeadally, Secure mobile payments. IT Professional 16(3), 36–43 (2014, in press)

    Google Scholar 

  17. J.T. Isaac, S. Zeadally, J.S. Camara, Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks. Electron. Commer. Res. 10(2), 209–233 (2010)

    Article  MATH  Google Scholar 

  18. J.T. Isaac, S. Zeadally, J.S. Camara, A lightweight secure mobile payment protocol for vehicular ad-hoc networks (vanets). Electron. Commer. Res. 12(1), 97–123 (2012)

    Article  Google Scholar 

  19. P. Kieseberg, M. Leithner, M. Mulazzani, L. Munroe, S. Schrittwieser, M. Sinha, E. Weippl, QR code security, in Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2010) (2010), pp. 430–435

    Google Scholar 

  20. K. Krombholz, P. Frühwirt, P. Kieseberg, I. Kapsalis, M. Huber, E. Weippl, QR code security: a survey of attacks and challenges for usable security, in Proceedings of Human Aspects of Information Security, Privacy, and Trust – Second International Conference, HAS 2014, Held as Part of HCI International 2014 (2014), pp. 79–90

    Google Scholar 

  21. Q. Li, G. Clark, Mobile security: a look ahead. IEEE Secur. Priv. 11(1), 78–81 (2013)

    Article  Google Scholar 

  22. W. Li, Q. Wen, Q. Su, Z. Jin, An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput. Commun. 35(2), 188–195 (2012)

    Article  Google Scholar 

  23. E.A. Morse, V. Raval, PCI DSS: payment card industry data security standards in context. Comput. Law Secur. Rev. 24(6), 540–554 (2008)

    Article  Google Scholar 

  24. P. Pourghomi, G. Ghinea, Ecosystem scenarios for cloud-based NFC payments, in Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems (MEDES 2013) (2013), pp. 113–118

    Google Scholar 

  25. S. Schwiderski-Grosche, H. Knospe, Secure mobile commerce. Electron. Commun. Eng. J. 14(5), 228–238 (2002)

    Article  Google Scholar 

  26. V.C. Sekhar, M. Sarvabhatla, A secure account-based mobile payment protocol with public key cryptography. ACEEE Int. J. Netw. Secur. 3(1), 5–9 (2012)

    Google Scholar 

  27. E.L. Slade, M.D. Williams, Y.K. Dwivedi, Mobile payment adoption: classification and review of the extant literature. Mark. Rev. 13(2), 167–190 (2013)

    Article  Google Scholar 

  28. A.K. Sood, S. Zeadally, Drive-by download attacks: a comparative study of browser exploit packs features and attack techniques. IEEE IT Prof. (2016, in press)

    Google Scholar 

  29. J. Téllez, J. Sierra, A. Izquierdo, M. Carbonell, Anonymous payment in a kiosk centric model using digital signature scheme with message recovery and low computational power devices. J. Theor. Appl. Electron. Commer. Res. 1(2), 1–11 (2006)

    Google Scholar 

  30. M. Whaiduzzaman, M. Sookhak, A. Gani, R. Buyya, A survey on vehicular cloud computing. J. Netw. Comput. Appl. 40, 325–344 (2014)

    Article  Google Scholar 

  31. S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, A. Hassan, Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4), 243–346 (2012)

    Article  Google Scholar 

  32. R. Zhang, J.Q. Chen, C.A.J. Lee, Mobile commerce and consumer privacy concerns. J. Comput. Inf. Syst. 53(4), 31–38 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Téllez, J., Zeadally, S. (2017). Future Challenges and Opportunities. In: Mobile Payment Systems. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-23033-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23033-7_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23032-0

  • Online ISBN: 978-3-319-23033-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics