Designing Secure Mobile Payment Protocol with Mutual Authentication

Main Article Content

สุรการ ดวงผาสุข
ชาลี ธรรมรัตน์


- In current time, the transaction protocol over the wireless network has been very popular. Many researchers presented a payment protocol for goods or services. However, the research papers presented still lack of security features such as mutual authentication. The performance of the protocol is dropping due to a lot of messages sending in the network. This research proposed a new protocol and security features to solve the existing research in case of confidentiality, integrity, non-repudiation, and mutual authentication. The proposed protocol has a number of messages less than existing protocols so the proposed protocol takes less time to complete transaction. Moreover, this paper also utilizes hybrid encryption between asymmetric encryption and symmetric encryption with hash function to ensure the security of the system.

Article Details

How to Cite
ดวงผาสุข ส. and ธรรมรัตน์ ช., “Designing Secure Mobile Payment Protocol with Mutual Authentication”, JIST, vol. 6, no. 2, pp. 28–37, Dec. 2016.
Research Article: Soft Computing (Detail in Scope of Journal)


1. S. Kungpisdan, and S. Metheekul, "A Secure Offline Key Generation With Protection Against Key Compromise," Proceedings of the 13th World Multi-conference on Systemics, Cybernetics, and Informatics 2009, Orlando, USA, 2009.

2. O. Dandash , Y. Wang , P. Dung, and L.B. Srinivasan , "Fraudulent Internet Banking Payments Prevention using Dynamic Key, Journal of Networks," Vol. 3, No. 1, Academy Publisher, pp. 25-34, 2008.

3. S. Kungpisdan, P.D. Le, and B. Srinivasan, "A Limited-Used Key Generation Scheme for Internet Transactions," Lecture Notes in Computer Science, Vol. 3325, 2005.

4. H.H. Ngo, X. Wu, P. D. Le, C. Wilson, and B. Srinivasan, "Dynamic Key Cryptography and Applications," International Journal of Network Security, Vol. 10, No. 3, pp. 161-174, 2010.

5. S. Kungpisdan, B. Srinivasan, and P.D. Le, "Lightweight Mobile Credit-card Payment Protocol," Lecture Notes in Computer Science, Vol. 2904, pp. 295-308, 2003.

6. A. D. Rubin, and R.N. Wright, "Off-line Generation of Limited-Use Credit Card Numbers," Lecture Notes in Computer Science, Vol. 2339, pp. 196-209, 2002.

7. M. Vahidalizadehdizaj and T Lixin, "A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC)," Intelligence and Security Informatics (ISI), 2015 IEEE International Conference, pp. 169-172, 2015.

8. M. Vahidalizadehdizaj, T. Lixin, and J. Jigar, "A new mobile payment protocol (GMPCP) by using a new group key agreement protocol (VTGKA)," In 2015 6th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1-7), 2015.

9. J. Yang, and L. Pei-Yu, "A mobile payment mechanism with anonymity for cloud computing," Journal of Systems and Software 116, pp. 69-74, 2016.

10. S. Kungpisdan, B. Srinivasan, and P.D. Le, "A secure account-based mobile payment protocol," Information Technology: Coding and Computing, Proceedings, ITCC 2004, International Conference on. Vol. 1. IEEE, pp. 35-39, 2004.