Security of Mobile Payments
Security of Mobile Payments
PAYMENTS
Electronic Payment Model
• Payer - customer
• Payee – merchant
• Issuer - financial organization
• Acquirer - verifies the validity of
the deposited payment
• Clearing - receives the payment
transcripts from the acquirers and
verifies them
2
Security Requirements
• Payer requirements
Collection
Withdrawal
Payment Sub-transactions
• Payee requirements
Payment
Deposit Sub-transactions.
• Issuer requirements
Collection
Withdrawal
Deposit transactions.
The balance of the payer’s account should be increased unless the payer explicitly transfers money to the
3
issuer during collection
Electronic Payment Systems
2. Electronic cash
3. Electronic checks
4. Account transfer
4
SSL-Based Payment Systems or (SET)
5
6 Steps Performed to Protect the Privacy of a Payment
Transaction
1. The customer opens an account.
2. The customer receives a certificate.
3. The payer places an order.
4. The payer sends the order and payment.
5. The payee requests payment authorization.
6. The payee confirms the order.
6
Steps performed to protect the privacy of a payment
transaction using the SET protocol.
7
Electronic Checks, Transfer, and Cash
• Payment systems using electronic checks or account transfer have the following three
properties:
Payers have central accounts
During the payment phase, the payer authenticates himself to a central server and the correct amount of
money is deduced from his account
The central server confirms the payment acceptance to the payer and sends him the correct amount of
money.
11
Conditional Anonymity in Payment Systems
• Anonymity of electronic money can be misused by many types of malicious
customers to carry out attacks such as:
Overspending
Illegal purchase
Blindfolding (i.e., Attacks engaging banks in non-standard protocols for withdrawal)
Performing a high number of micropayments in a very short period of time.
12
MOBILE PAYMENT SYSTEMS
Mobile Payment Model
14
Mobile Payment
15
Limitations of Wireless Environment and the
Security of the Mobile System
• Computational capability of the processors included in the devices is comparatively lower than what it
provided by personal computer.
• Connection cost of wireless networks is higher compared to that of fixed networks.
• Data transmitted over wireless networks is easily eavesdropped.
• Solutions:
1. Proxy-based mobile payment solution
Three-domain SET approach
Dai and zhang’s scheme
16
1. Proxy-Based Solutions
1. The payer informs the payee that he/she is starting a SET-based payment.
2. The payee notifies the payer that the payment session is about to be built.
3. The payer is redirected to the issuer’s server, which contains all payer information,
including those related to the credit card.
4. The issuer requests the payee to provide the authentication information to confirm
the payment.
5. The payer provides the authentication information to the issuer. The issuer
completes the SET payment transaction on behalf of the payer.
6. After transaction completion, the payer is redirected back to the payee’s site
17
2. Agent-based mobile payment solution
21
1. Copyright Requirements
• Imperceptibility
• Robustness
• Capacity and speed
• Blind detection
• Low false positives and false negatives
• Statistical imperceptibility
• Security
• Real-time detector complexity
22
2. Watermarking
23
Watermarking
24
3. Digital Fingerprinting
25
Fingerprinting in a Broadcast Channel
26