EconPapers    
Economics at your fingertips  
 

A Secure Mobile Wallet Framework with Formal Verification

Shaik Shakeel Ahamad, V. N. Sastry and Siba K. Udgata
Additional contact information
Shaik Shakeel Ahamad: Department of Computer and Information Sciences, University of Hyderabad, Hyderabad, India & Institute for Development and Research in Banking Technology, Castle Hills, Masab Tank, Hyderabad, India
V. N. Sastry: Institute for Development and Research in Banking Technology, Castle Hills, Masab Tank, Hyderabad, India
Siba K. Udgata: Department of Computer and Information Sciences, University of Hyderabad, Hyderabad, India

International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC), 2012, vol. 4, issue 2, 1-15

Abstract: This paper proposes a Secure Mobile Wallet Framework (SMWF) using WPKI (Wireless Public Key Infrastructure) and UICC (Universal Integrated Circuit Card) by defining (a) a procedure of personalizing UICC by the client, (b) a procedure of provisioning and personalization (Mutual Authentication and Key Agreement Protocol) of Mobile Payments Application (which is on UICC) by the Bank and (c) our proposed mobile wallet is will have mobile wallet manager managed by CA (acting as TSM), every mobile application is independent, protected by firewalls and encrypted data is stored in the mobile wallet application. Their proposed Mobile Wallet ensures end to end security. The authors’ proposed SMWF is compared with recent works and found to be better in terms of generating client’s credentials, implementation of WPKI in UICC, personalization of mobile payment application by the bank and in ensuring end to end security (i.e., from Mobile Payments Application in UICC to the Bank Server). The proposed mobile payment protocol originating from Mobile Payment Application (which is on UICC) to the Bank Server realizes Fair Exchange ensures Confidentiality, Authentication, Integrity and Non Repudiation, prevents double spending, over spending and money laundering, and withstands replay, Man in the Middle (MITM) and Impersonation attacks. Proposed mobile payment protocol is formally verified using AVISPA and Scyther Tool and presented with results.

Date: 2012
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/japuc.2012040101 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:japuc0:v:4:y:2012:i:2:p:1-15

Access Statistics for this article

International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) is currently edited by Tao Gao

More articles in International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:japuc0:v:4:y:2012:i:2:p:1-15