11 - Chapter - 7
11 - Chapter - 7
11 - Chapter - 7
net/publication/320442889
Article in International Journal of Emerging Trends & Technology in Computer Science · March 2017
CITATIONS READS
0 168
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Bazeem Ismaeil Khan on 22 November 2018.
33
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 24 Issue 4 – MARCH 2017.
We know digital signature algorithm is more complicated effective push pull services officering SMS based mobile
than hash function and symmetric cryptographic algorithm, banking concept has been illustrated for 24 hours banking
which may affect the performance of the mobile device. convenience which helps customers stay on top of any recent
Second, each transaction signed with user’s private key may changes made in their current or deposit account or loan
reveal user’s identification such that the user’s privacy is through SMS [13].
disclosed. Third, the micropayment scheme should be Arogundade e.t. al. propose an open network system which
economic; that is, the rounds of challenge–response should be can adapt to users changing needs as well as allowing
reduced to a minimum level. In this paper, we propose an effective and secured transaction via any customers’ bank
improved lightweight micropayment scheme based on hash account. They proposed a novel approach by utilizing
chain and Lagrange interpolation formula to achieve privacy, cancelable biometric features for securely storing the
fairness, security, efficiency, and low cost of use [6]. fingerprint template by generating Secured Feature Matrix
The remainder of this paper is organized as in the following and keys for cryptographic techniques applied for data
sections. Section 2will describe the related works on data Encryption or Decryption [14].
micropayment schemes. Section 3 will present the Mohammad Al-Fayoumi discuss an important epayment
proposedmicropayment scheme method. In Section 4, we will protocol namely pay-word scheme and examine its
analyzethe results ofproposed method and compare it with advantages and limitations, which encourages the authors to
standard data micropayment methods. Finally, a brief improve the scheme that keeps all characteristics intact
conclusion will be given in Section 5. without compromise of the security robustness [15].
Kaylash Chaudhary e.t. al. have carried out an assessment
II. RELATED WORK of micro-payment against a non-micro-payment credit
Zhi-Yuan Hu et al. has designed an innovative and practical systems for file sharing applications. Charles K. Ayo and
authentication system, Anonymous Micropayments Wilfred IsiomaUkpere proposed a unified (single) smart
Authentication (AMA), is designed for micropayments in card-based ATM card with biometricbased cash dispenser for
mobile data network. But his work has a relative drawback for all banking transactions Wang proposes a novel payment
common problems of authentication mechanism based on system with smart mobile devices, wherein customers are not
symmetric key cryptography [7]. limited to purchase e-cash with the fixed face-value Currently,
Xiaoling Dai et al. has researched on micropayment researchers focus on the e-payment system such that
protocols in offline with multiple vendors. They introduced electronic cash electronic check electronic traveler’s check
several micro-payment schemes based on one-way hash chain and so on. Moreover, many researchers proposed the e-cash
and review some literatures on supporting multiple payment. payment protocol using plenty of computational resources
The author has also proposed a new micropayment scheme, such that exponential operation. It causes the big burden for
which achieves the following three goals: micro-payment the system [16].
multiple transactions, service providers, and anonymity [8]. Chang and Lai proposed a flexible date attachment scheme
Aboud et al. has proposed a trust model from user point of on e-cash and Juang proposed the Dcash. Curanintroduced
view and combined it with MR2 micropayment scheme and some possible additional security measures which could be
called the new scheme TMR2. This trust model is supported implemented to strengthen the overall security architecture of
by micropayment provider and assures the users that they will Bluetooth enabled devices for ecommerce applications
not be charged for in case the product is not satisfactory or it is against man-in-the middle attack and denial-of-service attacks
corrupt [9]. [17].
Min-Shiange.t. al. has studied various probabilistic Wanget al.proposed a novel payment system with smart
micropayment Scheme shows that the scheme by Rivest may mobile devices, wherein customers are not limited to purchase
reduce the administrative cost of the bank, however it brings e-cash with the fixed face-value. The amount of every
extensive computational overhead to the merchant [10]. transaction is deducted directly from the customer's account,
Lih-ChyauWuu has proposed a secure and efficient off-line eliminating the inconvenience of fixed face-value of the
micro payment scheme which uses coin chain technique to e-cash, and reducing online computation cost of a bank. Using
make coin that the verification of coin can be done quickly by a technique of trapdoor hash function to mitigate the
hash computation. This scheme also ensures that coins could computational cost, our system can be used with the mobile
only be used by their owner, and protects the privacy of the devices effectively [18].
consumer [11]. Natarajan introduced a system and method of extensible
VivekKatiyare.t. al. has discussed about role of Elliptical authentication protocols (EAPs) based on ECC and SKE with
Curve Cryptography and presents a survey on the current use a permutation technique evolved. The permutation in our
of ECC in the pervasive computing environment. Husna EAPs is a process of cubing a random number w.r.to a prime.
Osman and Hamish Taylor has discussed three key design These EAPs are compatible with 3G and 4G networks and no
considerations in implementing a fully distributed reputation certificates exchanged during the communication [19].
system for ad hoc m-commerce trading systems, namely Panjwani has analyzed two token-based authentication
relevant reputation information, its storage and reliability schemes, designed for authenticating users in banking
[12]. systems implemented over mobile networks. The first scheme
FouziaMousumi and Subrun Jamil has described cost is currently deployed in India by a mobile banking service
provider named Eko with a reach of over 50,000 customers.
34
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 24 Issue 4 – MARCH 2017.
The second scheme was proposed recently (in joint effort with the intermediate routers for forwarding the packets.
Eko) to fix weaknesses in the first one, and is now being
C. Initiating Payment
considered for deployment. Both systems rely on PINs and
printed codebooks (which are unique per user) for This step is about initiating payments in the system by the
authentication [20]. user. P transmits message in his network and appends a hash
Chaix explores the economic models associated to different token from sub-chains. The payment scheme in independent
mobile-payment systems. Obviously it can be seen that of increased used of hash values for multiple payments by the
majority of the work is carried on wired network with much user ensuring much less network overhead. In case the
less consideration of wireless network. The issues related to intermediate relay nodes have captivated the hash values, they
dynamic topologies of wireless adhoc network are not will not be able to decipher them without broker agreement
discussed in detailed in any of the researches described above. and its respective signature.
Although there are some effective research being done in the D. New Route Consideration
area of payment system, but there is a huge research gap in This step is performed as wireless adhoc network quite often
this area with respect to wireless mobile adhoc network [21]. changes their topology dynamically. In case of new route, the
system needs not to contact the any TTP. Overhead is reduced
III. PROPOSED WORK by observing the new nodes in the route and using only them
The proposed protocol now termed as Secure Payment in for the distributing the secure endorsement. The following
Mobile Commerce deploys the authority that has to be signed algorithm explains the route consideration policy.
by mobile agent and m-token key authorized by merchant. Input : grid, number_of_column
The authority file that is signed is utilized by merchant in
order to confirm the transaction parameters and authorized temp A (number_of_column) % 4
m-token that needs to be used in order to resist any malicious noc Å number_of_column
activity from any customer. The similar phenomenon can also if (temp = 0)
be used to determine any issues with merchants too. The two_col Å noc
proposed method contains the following modules namely, two_col_zigzag(grid,two_col)
broker agreement, cost and endorsement delivery, initiating else if(temp = 1)
payments, new route consideration, transferring tokens, and two_col Å noc-3
broker approval. The proposed methodology can be two_col_zigzag(grid,two_col)
explained in brief steps as following: three_col_path(grid)
A. Broker Agreement else if(temp = 2)
two_col Å noc-2
A broker supplies it’s registered and authorized user will a
two_col_zigzag(grid,two_col)
secure and tamper-proof token with public key pair along with
straight_up(grid,noc-1)
highly encrypted user identity. Any micropayment schemes
straight_down(grid,noc)
like credit card can be used for designing the application. The
else if(temp = 3)
user then sends a signature message consisting of hash value
two_col Å noc-1
and payment information which is encrypted with public key
two_col_zigzag(grid,two_col)
of broker. The broker generates (agreement) secret
straight_down(grid,noc)
endorsement data which consists of a random number, an
end
anchor value, length of hash chain, user-identity, and expiry
horizontal_path(grid)
of chain. These set of information is secured by private keys
of broker. Therefore the broker agreement can only be
deciphered by user’s token. However, the security of tokens E. Transferring Tokens
(smart cards) are not reliable as it can be deciphered, so the Here the intermediate relay node transmits the greater hash
broker private information is appended with expiry date in values in one chain that has spent it by the node. The user
order to restrict an unauthorized user in the range of mobile token then transmit the hash value to the consecutive broker
network to have an access on the confidential information with their endorsement digitally signed. The message and its
transacted between user and broker. highly encrypted contents are validated by the broker as well
B. Cost and Endorsement Delivery as issue an acknowledgement. 6. Broker Approval: The
proposed system does support multiple brokers for reliable
A sender node P sends the cost request message encrypted
communication which allows any user to get associated with
with digital signature using their private keys to query the
any broker available in the network. The user in the first
route of recipient node Q. All intermediate nodes attach
network receives payment chain from the broker in that
certificates so that the origin node will be able to validate the
network, it assist the same user for validating the digital
digital certificates on the cost details. The data for cost reply
certificates generated by the nodes in new network when the
message is returned to P. After estimating the cost
network topology changes. The assumption to this step is that
involvement in routing, the encrypted broker endorsement is
the user, broker and all the entities involved should first get
sent to all relay nodes in the network. These endorsements are
them registered and then perform the task.
private data, so each user encrypt with their public key, which
can be received from cost reply message. This scheme pays
35
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 24 Issue 4 – MARCH 2017.
IV. EXPERIMENTAL ANALYSIS results higher length of transferred chains which can reduce
To give a performance evaluation of the proposed communication costs by decreasing needed commitment
micropayment scheme, we present simulation results of messages.
proposed method and compared it with PayWord and
PPayWord schemes a computational and communicational
costs. Computational cost is considered as the overall needed
CPU cycles at broker and communicational cost is overall the
transmitted payment messages volume. Results are showed in
two typical fixed lengths of chains, 10 and 20 and a chain is
considered as partially used and is not transferable if its spent
length is less than the configured chain length.
V. CONCLUSION
The current work is focused on designing an offline payment
Figure 1. Computational cost system in mobile commerce specifically taking
B. Communicational Cost micro-payment as case study. Majority of the work done in
Figure 2 shows that in PPayWord communication cost prior research work is concentrated on online safety along
increases based on the length of the chains because lesser with service provider too. But, in this work, it can be seen that
chain length means we need more commitment messages. SP also requires generating secure supportive hash value for
Onthe other hand, unlike PayWord scheme wherein most of every secure channel data that is sent via smart-phone of the
the messages are sent toPPayWord: A Secure and Fast P2P customer C. Then SP forwards the legitimate secure channel
Micropayment Scheme for Video Streaming 89broker at the information and subsequent supportive hash vale to the
end of day, in PPayWord this cost is distributed over time and merchant in every transactions offline. The m-token in system
does notmake the broker as a bottleneck of the payment schema considered in customer and merchant dependent. This
system. Higher stability of peers’ linksin the overlay structure phenomenon restricts the portability of the secure channel
information to a greater extent. The current work therefore
36
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE)
ISSN: 0976-1353 Volume 24 Issue 4 – MARCH 2017.
has introduced a real time offline payment system from a mobile and wireless communications”, Advances in E-Activities,
Information Security and Privacy, 2011
Mobile-agent and service providers and termed the scheme. [20] Saurabh Panjwani, Prasad Naldurg, RaghavBhaskar, “Analysis of Two
The proposed scheme restricts the customers for performing a Token-Based Authentication Schemes for Mobile Banking”,
malicious activity even in offline mode using m-token. Technical Report of Microsoft Research, 2010
Therefore, the proposed system is found to satisfy all the [21] Laetitia Chaix and Dominique Torre, “Different models for mobile
payments, research paper, 2010
critical security requirements in micro-payment system. The
proposed schema is also cost-effective as it does not posses
any operation with public key for any types of purchases
being made.
REFERENCES
[1] Zygmunt J. Haas, Jing Deng, Ben Liang, Panagiotis Papadimitratos, S.
Sajama,”Wireless ad hoc Networks”, John Wiley & Sons, Inc, 2003
[2] Yuntsai Chou, Chiwei Lee and Jianru Chung, “Understanding
m-commerce payment systems through the analytic hierarchy
process”, Journal of Business Research, Volume 57, Issue 12,
December 2004, Pages 1423-1430
[3] Neal Leavitt, “Payment Applications Make E-Commerce Mobile”,
IEEE Computer Society, 2010
[4] Rafael Martínez-Peláez, Francisco Rico-Novella, Cristina Satizábal
and Jhon J. Padilla, “Performance Analysis of Mobile Payment
Protocols over the Bluetooth Wireless Network”, Whitepaper, 2008
[5] HeikoKnospe, Scarlet Schwiderski-Grosche, “Future mobile networks:
ad-hoc access based on online payment with smartcards”, IEEE, 2002
[6] Peter Tarasewich, Robert C. Nickerson, Merrill Warkentin,
“Wireless/Mobile E-commerce: technologies, applications, and
issues”, Seventh Americas Conference on Information Systems, 2001
[7] Zhi-Yuan Hu, Yao-Wei Liu, Xiao Hu, Jian-Hua Li, Anonymous
Micropayments Authentication (AMA) in Mobile Data Network,
INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE
Computer and Communications Societies Iss: 7 March 2004,
[8] Min-Shiang Hwang, Pei-Chen Sung, A Study of Micropayment Based
on One-Way Hash Chain, International Journal of Network Security,
Vol.2, No.2, PP.81–90, Mar. 2006
[9] Al-Fayoumi, M., Aboud, S., Al-Fayoumi, M., “Practical E-Payment
Scheme”, International Journal of Computer Science Issues, vol. 7, no.
7, May. 2010
[10] Xiaoling Dai, OluwatomiAyoade, and John Grundy, Offline
Micro-payment Protocol for Multiple Vendors in Mobile Commerce,
Proceeding PDCAT '06 Proceedings of the Seventh International
Conference on Parallel and Distributed Computing, Applications and
Technologies, IEEE Computer Society Washington, 2006 R. Hauser,
M. Steiner, and M. Waidner, "Micro-payments based on iKP", in Proc.
of the 14th Worldwide Congress on Computer and Communications
Security Protection, Paris, 1996, pp.67-82,
http://www.zurich.ibm.com
[11] Lih-Chyau Wuu, Kuang-Yi Chen, Chih-Ming Lin, OffLine Micro
Payment Scheme with Dual Signature, Journal of Computers, Vol.19,
No.1, April 2008
[12] VivekKatiyar, Kamlesh Dutta, Syona Gupta, A Survey on Elliptic
Curve Cryptography for Pervasive Computing Environment,
International Journal of Computer Applications (0975 – 8887) Volume
11– No.10, December 2010
[13] FouziaMousumi, Subrun Jamil, Push Pull Services Offering SMS
Based m-Banking System in Context of Bangladesh, International
Arab Journal of e-Technology, Vol. 1, No. 3, January 2010
[14] Arogundade O.T, Ikotun A. Motunrayo, OlaniyiAdemola, Developing
a Usage-centered e-Payment Model using Open Network System,
International Journal of Computer Applications (0975 – 8887) Volume
12– No.6, December 2010
[15] Mohammad Al-Fayoumi, SattarAboud and Mustafa AlFayoumi,
Practical E-Payment Scheme, IJCSI International Journal of Computer
Science Issues, Vol. 7, Issue 3, No 7, May 2010
[16] Kaylash Chaudhary, Xiaoling Dai and John Grundy, Experiences in
Developing a Micro-payment System for Peer-to-Peer Networks,
International Journal of Information Technology and Web
Engineering, vol. 5, no. 1, 2010
[17] C. C. Chang and Y. P. Lai, “A flexible Date-attachment Scheme on
E-cash”, Computers & Security, Vol. 22, No. 2, pp.160-166, 2003.
[18] Jian-Sen Wang, Fuw-Yi Yang, and Incheon Paik, “A Novel E-cash
Payment Protocol Using Trapdoor Hash Function on Smart Mobile
Devices”, IJCSNS International Journal of Computer Science and
Network Security, Vol.11 No.6, June 2011
[19] Natarajan Vijayarangan, “A system and design of Extensible
Authentication Protocols based on ECC and SKE mechanisms for
37
View publication stats