CFP last date
01 January 2025
Reseach Article

Secured Payment Protocol

by Swapna Khandekar, Richard Kolk, Jingyuan Liang
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 6
Year of Publication: 2017
Authors: Swapna Khandekar, Richard Kolk, Jingyuan Liang
10.5120/cae2017652459

Swapna Khandekar, Richard Kolk, Jingyuan Liang . Secured Payment Protocol. Communications on Applied Electronics. 6, 6 ( Jan 2017), 5-10. DOI=10.5120/cae2017652459

@article{ 10.5120/cae2017652459,
author = { Swapna Khandekar, Richard Kolk, Jingyuan Liang },
title = { Secured Payment Protocol },
journal = { Communications on Applied Electronics },
issue_date = { Jan 2017 },
volume = { 6 },
number = { 6 },
month = { Jan },
year = { 2017 },
issn = { 2394-4714 },
pages = { 5-10 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume6/number6/695-2016652459/ },
doi = { 10.5120/cae2017652459 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:56:15.240139+05:30
%A Swapna Khandekar
%A Richard Kolk
%A Jingyuan Liang
%T Secured Payment Protocol
%J Communications on Applied Electronics
%@ 2394-4714
%V 6
%N 6
%P 5-10
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, there is tremendous increase in usage of online payment applications. It is simple, quick and efficient mode of money transfer. From common man to business man, everyone is taking advantage of these applications to make transactions easy. However, with advancements in technology, security threats have increased drastically. In this research paper, secured payment protocol using self- certified key generation method has been suggested. In order to understand, potential security threats in any payment protocol, one should have clear idea about possible vulnerabilities in it. Considering these vulnerabilities, authors have suggested preliminary version for new payment protocol. In this analysis, authors have used various methodologies like reverse engineering, study of security attacks. Also authors have proposed an energy-efficient model to improve energy efficiency for payment application.This study will be helpful in improving security in payment application and in growth of e – commerce bussiness.

References
  1. C. Kim, K. Changsu, T. Wang, S. Namchul, and K. Ki-Soo, “An empirical study of customers’ perceptions of security and trust in e-payment systems,” Electron. Commer. Res. Appl., vol. 9, no. 1, pp. 84–95, 2010.
  2. X. Hu, H. Xianpei, L. Wenli, and H. Qing, “Are Mobile Payment and Banking the Killer Apps for Mobile Commerce?,” in Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008.
  3. M. Niranjanamurthy and D. Chahar, “The study of e-commerce security issues and solutions,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 7, 2013.
  4. K. Thompson and T. Ken, “Reflections on trusting trust,” Commun. ACM, vol. 27, no. 8, pp. 761–763, 1984.
  5. A. K. Jain and S. Devendra, “Addressing Security and Privacy Risks in Mobile Applications,” IT Prof., vol. 14, no. 5, pp. 28–33, 2012.
  6. A. K. Ghosh and T. M. Swaminatha, “Software security and privacy risks in mobile e-commerce,” Commun. ACM, vol. 44, no. 2, pp. 51–57, 2001.
  7. R. A. Botha, S. M. Furnell, and N. L. Clarke, “From desktop to mobile: Examining the security experience,” Comput. Secur., vol. 28, no. 3–4, pp. 130–137, 2009.
  8. P. S. Maan and M. Sharma, “Social Engineering: A Partial Technical Attack,” International Journal of Computer Science, vol. 9, no. 2, 2012.
  9. B. Kraft, E. Mannes, and J. Moldow, “Security Research of a Social Payment App.” 2014.
  10. “About Square Cash.” [Online]. Available: https://squareup.com/help/us/en/article/5187-about-square-cash. [Accessed: 13-Oct-2015].
  11. Swapna Khandekar, Jingyuan Liang, Abdul Razaque, Fathi Amsaad and Musbah Abdulgader. “Security Research of a Social Payment App and Suggested Improvement”. Communications on Applied Electronics 4(5):14-21, February 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX
  12. K. Sahadevaiah, S. Kuncha, and P. R. P.V.G.D., “Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks,” Network Protocols and Algorithms, vol. 3, no. 4, 2011.
  13. W. Li, L. Wenmin, W. Qiaoyan, S. Qi, and J. Zhengping, “An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network,” Comput. Commun., vol. 35, no. 2, pp. 188–195, 2012.
  14. Isaac, Jesus Tellez, Jose Sierra Camara, Sherali Zeadally, and Joaquin Torres Marquez. "A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks." Computer Communications 31,  no. 10(2008):2478-2484.
Index Terms

Computer Science
Information Sciences

Keywords

Key Generation Social engineering attacks Energy efficiency Scalability Security Payment Protocol Private Key Public Key