E-Book, Englisch, 142 Seiten
Téllez / Zeadally Mobile Payment Systems
1. Auflage 2017
ISBN: 978-3-319-23033-7
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark
Secure Network Architectures and Protocols
E-Book, Englisch, 142 Seiten
Reihe: Computer Communications and Networks
ISBN: 978-3-319-23033-7
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark
This important text/reference presents the latest research and developments in the field of mobile payment systems (MPS), covering issues of mobile device security, architectures and models for MPS, and transaction security in MPS. Topics and features: introduces the fundamental concepts in MPS, discussing the benefits and disadvantages of such systems, and the entities that underpin them; reviews the mobile devices and operating systems currently available on the market, describing how to identify and avoid security threats to such devices; examines the different models for mobile payments, presenting a classification based on their core features; presents a summary of the most commonly used cryptography schemes for secure communications; outlines the key challenges in MPS, covering security for ubiquitous mobile commerce and usability issues; highlights the opportunities offered by mobile cloud computing and vehicular ad hoc networks in the design and development of MPS.
Dr. Jesús Téllez is an Associate Professor in the Department of Computer Science at the University of Carabobo, Valencia, Venezuela.
Dr. Sherali Zeadally is an Associate Professor in the College of Communication and Information at the University of Kentucky, Lexington, KY, USA. His other publications include the Springer titles Privacy in a Digital, Networked World, Next-Generation Wireless Technologies, and Unique Radio Innovation for the 21st Century.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;8
2;Contents;11
3;1 Introduction;13
3.1;1.1 Electronic Money;13
3.1.1;1.1.1 Advantages and Disadvantages of Electronic Money;15
3.1.2;1.1.2 Characteristics of Electronic Money;15
3.2;1.2 Electronic Commerce;16
3.3;1.3 Mobile Commerce;18
3.4;1.4 Mobile Payment;19
3.4.1;1.4.1 Mobile Payment Characteristics;20
3.4.2;1.4.2 Existing Mobile Payment Methods;21
3.4.2.1;1.4.2.1 Basis of Payment;21
3.4.2.2;1.4.2.2 Timing of Payment;23
3.4.2.3;1.4.2.3 Medium of Payment;23
3.4.2.4;1.4.2.4 Payment Amount;24
3.4.2.5;1.4.2.5 Location of Payment;24
3.4.3;1.4.3 Mobile Payment Stakeholders;24
3.4.4;1.4.4 Technologies for Mobile Payments;25
3.5;1.5 Mobile Payment System (MPS);27
3.5.1;1.5.1 Entities;28
4;2 Mobile Device Security;31
4.1;2.1 Mobile Devices;31
4.1.1;2.1.1 Classification of Mobile Devices;31
4.1.2;2.1.2 Mobile Operating Systems (Mobile OSs);33
4.2;2.2 Mobile Device Security;35
4.2.1;2.2.1 Mobile Device Security Versus PersonalComputer Security;37
4.2.2;2.2.2 Threat Model;38
4.2.2.1;2.2.2.1 Targets for Mobile Device;39
4.2.2.2;2.2.2.2 Adversaries;40
4.2.2.3;2.2.2.3 Attack Vectors;40
4.2.3;2.2.3 Mobile Malware;41
4.2.4;2.2.4 Security Solutions for Mobile Devices;43
4.2.4.1;2.2.4.1 Intrusion Detection Systems;43
4.2.4.2;2.2.4.2 Trusted Mobile;44
5;3 Architectures and Models for Mobile Payment Systems;46
5.1;3.1 Classifications of Mobile Payment Models: State of the Art;46
5.1.1;3.1.1 Micro-payments;46
5.1.2;3.1.2 Cryptographic Technique;53
5.1.2.1;3.1.2.1 Asymmetric Cryptographic;53
5.1.2.2;3.1.2.2 Symmetric Cryptographic;57
5.1.3;3.1.3 Technology Used;62
5.1.3.1;3.1.3.1 Short Message Service (SMS);62
5.1.3.2;3.1.3.2 Biometric Technology;67
5.1.3.3;3.1.3.3 Radio-Frequency Identification (RFID) Technology;68
5.1.3.4;3.1.3.4 Near Field Communication (NFC);73
5.1.3.5;3.1.3.5 2-D Barcode Technology;77
5.1.3.6;3.1.3.6 Peer-to-Peer (P2P) Technology;81
5.1.4;3.1.4 Session Initiation Protocol (SIP);86
5.1.5;3.1.5 Communication Restriction;90
5.1.6;3.1.6 Mobile Agent Technology;97
5.1.7;3.1.7 Wireless Application Protocol (WAP);101
6;4 Security in Mobile Payment Systems;103
6.1;4.1 Security Requirements;103
6.2;4.2 Basic Concepts in Cryptography;105
6.2.1;4.2.1 Secure Sockets Layer (SSL);105
6.2.2;4.2.2 Symmetric Cryptography;105
6.2.2.1;4.2.2.1 Message Authentication Code (MAC);107
6.2.3;4.2.3 Public Key Cryptography;108
6.2.3.1;4.2.3.1 Digital Signatures;109
6.2.3.2;4.2.3.2 Certificate Authorities;110
6.2.4;4.2.4 Elliptic Curve Cryptography;111
6.2.5;4.2.5 Self-Certified Public Keys;112
6.2.6;4.2.6 Security Vulnerabilities, Threats, Risks, and Protection Solutions;112
6.3;4.3 Security and Constraints of Mobile Payment Systems;113
6.3.1;4.3.1 Constraint of Wireless Environments;113
6.3.1.1;4.3.1.1 Resource Limitations of Mobile Devices;113
6.3.2;4.3.2 Characteristics of Wireless Networks;116
7;5 Future Challenges and Opportunities;117
8;Bibliography;128
9;Index;138




