Abstract
In this chapter, we some future security challenges that should be addressed by researchers and designers of mobile payment systems in order to provide a secure environment for ubiquitous mobile commerce. We also highlight some of the challenges faced by users of mobile payment systems which must be understood by designers of such systems to maximize the overall user satisfaction. Finally, we also analyze some alternative cryptographic schemes in the design of mobile payments systems along with opportunities offered by other technologies such as Mobile Cloud computing (MCC) and Vehicular Ad hoc NETworks (VANETs).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
EMV is a technical standard for smart payments and for payment terminals and automated teller machines.
Bibliography
K. Aoki, E.J. Downes, An analysis of young people’s use of and attitudes toward cell phones. Telematics Inform. 20(4), 349–364 (2003)
N. Ben-Asher, H. Sieger, A. Ben-Oved, N. Kirschnick, J. Meyer, S. Möller, On the need for different security methods on mobile phones, in Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2011) (2011)
S. Bitam, A. Mellouk, S. Zeadally, VANET-cloud: a generic cloud computing model for vehicular ad-hoc networks. IEEE Wirel. Commun. Mag. 2(1), 96–102 (2015)
C.-L. Chen, W.-C. Tsai, Using a stored-value card to provide an added-value service of payment protocol in vanet, in Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2013) (2013), pp. 660–665
C. Cox, S. Sanchez, Transforming the customer experience: the promise of mobile wallets. Technical report, First Data Thought Leadership (2013), http://tex.stackexchange.com/questions/5957/bibtex-entry-for-white-papers-and-technical-reports
M. Crowe, E. Tavilla, Mobile phone technology: “smarter” than we thought (2012), http://www.bostonfed.org/bankinfo/payment-strategies/index.htm. Last accessed 30 Sept 2013
A. Dedeche, F. Liu, M. Le, S. Lajami, Emergent BYOD security challenges and mitigation strategy (2013), https://minerva-access.unimelb.edu.au/bitstream/handle/11343/33340/300297_2013_Lajami_Strategy.pdf?sequence=1. Last accessed Aug 2014
H.T. Dinh, C. Lee, D. Niyato, P. Wang, A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587–1611 (2013)
J. Gao, A. Küpper, Emerging technologies for mobile commerce. J. Theor. Appl. Electron. Commer. Res. 1(1), Editorial (2006)
J.A. Guerrero-Ibáñez, C. Flores-Cortés, S. Zeadally, Vehicular ad-hoc networks (VANETs): architecture, protocols and applications, in Next-Generation Wireless Technologies: 4G and Beyond, ed. by N. Chilamkurti, S. Zeadally, H. Chaouchi (Springer, London, 2013), pp. 49–70. ISBN:978-1-4471-5164-7
S. Hillman, C. Neustaedter, E. Oduor, C. Pang, Mobile payment systems in north america: user challenges & successes, in Proceedings of the Extended Abstracts of the 32nd Annual ACM Conference on Human Factors in Computing Systems (CHI EA 2014) (2014), pp. 1909–1914
R.-J. Hwang, F.-F. Su, L.-S. Huang, Fast firmware implementation of RSA-like security protocol for mobile devices. Wirel. Pers. Commun. 42(2), 213–223 (2007)
J.T. Isaac, J.S. Cámara, An anonymous account-based mobile payment protocol for a restricted connectivity scenario, in 18th International Workshop on Database and Expert Systems Applications (DEXA 2007) (2007), pp. 688–692
J.T. Isaac, J.S. Cámara, S. Zeadally, J.T. Márquez, A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. Comput. Commun. 31(10), 2478–2484 (2008)
J.T. Isaac, S. Zeadally, An anonymous secure payment protocol in a payment gateway centric model. Procedia CS 10, 758–765 (2012)
J.T. Isaac, S. Zeadally, Secure mobile payments. IT Professional 16(3), 36–43 (2014, in press)
J.T. Isaac, S. Zeadally, J.S. Camara, Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks. Electron. Commer. Res. 10(2), 209–233 (2010)
J.T. Isaac, S. Zeadally, J.S. Camara, A lightweight secure mobile payment protocol for vehicular ad-hoc networks (vanets). Electron. Commer. Res. 12(1), 97–123 (2012)
P. Kieseberg, M. Leithner, M. Mulazzani, L. Munroe, S. Schrittwieser, M. Sinha, E. Weippl, QR code security, in Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2010) (2010), pp. 430–435
K. Krombholz, P. Frühwirt, P. Kieseberg, I. Kapsalis, M. Huber, E. Weippl, QR code security: a survey of attacks and challenges for usable security, in Proceedings of Human Aspects of Information Security, Privacy, and Trust – Second International Conference, HAS 2014, Held as Part of HCI International 2014 (2014), pp. 79–90
Q. Li, G. Clark, Mobile security: a look ahead. IEEE Secur. Priv. 11(1), 78–81 (2013)
W. Li, Q. Wen, Q. Su, Z. Jin, An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput. Commun. 35(2), 188–195 (2012)
E.A. Morse, V. Raval, PCI DSS: payment card industry data security standards in context. Comput. Law Secur. Rev. 24(6), 540–554 (2008)
P. Pourghomi, G. Ghinea, Ecosystem scenarios for cloud-based NFC payments, in Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems (MEDES 2013) (2013), pp. 113–118
S. Schwiderski-Grosche, H. Knospe, Secure mobile commerce. Electron. Commun. Eng. J. 14(5), 228–238 (2002)
V.C. Sekhar, M. Sarvabhatla, A secure account-based mobile payment protocol with public key cryptography. ACEEE Int. J. Netw. Secur. 3(1), 5–9 (2012)
E.L. Slade, M.D. Williams, Y.K. Dwivedi, Mobile payment adoption: classification and review of the extant literature. Mark. Rev. 13(2), 167–190 (2013)
A.K. Sood, S. Zeadally, Drive-by download attacks: a comparative study of browser exploit packs features and attack techniques. IEEE IT Prof. (2016, in press)
J. Téllez, J. Sierra, A. Izquierdo, M. Carbonell, Anonymous payment in a kiosk centric model using digital signature scheme with message recovery and low computational power devices. J. Theor. Appl. Electron. Commer. Res. 1(2), 1–11 (2006)
M. Whaiduzzaman, M. Sookhak, A. Gani, R. Buyya, A survey on vehicular cloud computing. J. Netw. Comput. Appl. 40, 325–344 (2014)
S. Zeadally, R. Hunt, Y.-S. Chen, A. Irwin, A. Hassan, Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4), 243–346 (2012)
R. Zhang, J.Q. Chen, C.A.J. Lee, Mobile commerce and consumer privacy concerns. J. Comput. Inf. Syst. 53(4), 31–38 (2013)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Téllez, J., Zeadally, S. (2017). Future Challenges and Opportunities. In: Mobile Payment Systems. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-23033-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-23033-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23032-0
Online ISBN: 978-3-319-23033-7
eBook Packages: Computer ScienceComputer Science (R0)