Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model

Jesús Téllez Isaac, Sherali Zeadally

Research output: Contribution to journalArticlepeer-review

10 Scopus citations

Abstract

Many mobile payment systems have emerged in the last few years which allow payments for services and goods from mobile devices. However, most of them have been based on a scenario where all the entities are directly connected to each other (formally called the full connectivity scenario) and do not consider those situations where the client cannot directly communicate with the merchant. We present the design and the implementation of an anonymous secure payment protocol based on the payment gateway centric scenario for mobile environments where the client cannot communicate directly with the merchant to process the payment request. Our proposed payment protocol uses symmetric-key operations because of their low computational requirements. We present a performance evaluation of the proposed payment protocol in a real environment. Performance results obtained with the implemented protocol demonstrate that our protocol achieves a small execution time (11.68 s) for a payment transaction using a mobile phone and a restricted scenario which causes only a slight increase in the number of the steps necessary to complete a payment transaction as a result of the lack of direct communication between the client and the merchant.

Original languageEnglish
Pages (from-to)587-611
Number of pages25
JournalComputing
Volume96
Issue number7
DOIs
StatePublished - Apr 2014

Bibliographical note

Funding Information:
We thank the anonymous reviewers for their constructive comments which helped us improve the presentation and quality of this paper. Sherali Zeadally was partially supported by a District of Columbia NASA Space Grant during the course of this work.

Keywords

  • Implementation
  • Mobile payment protocol
  • Performance evaluation
  • Secure protocol
  • Security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Software
  • Numerical Analysis
  • Computer Science Applications
  • Computational Theory and Mathematics
  • Computational Mathematics

Fingerprint

Dive into the research topics of 'Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model'. Together they form a unique fingerprint.

Cite this