Mobile Payment: A Review

Main Article Content

Surakarn Duangphasuk
Chalee Thammarat
Supakorn Kungpisdan

Abstract

Currently, online business, especially e-commerce where buying and selling of goods and/or services are via the Internet, is being used widespread. It allows people to buy goods and/or services from anywhere at any time and get delivery to any location. Mobile commerce is one of the most popular types of electronic commerce. In this paper, we propose a literature review of current research results obtained by specialists and researchers area of the mobile payment.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
S. Duangphasuk, C. Thammarat, and S. Kungpisdan, “Mobile Payment: A Review”, JIST, vol. 10, no. 2, pp. 10-18, Dec. 2020.
Section
Research Article: Networking (Detail in Scope of Journal)

References

[1] E. W. Ngai, and A. Gunasekaran, “A review for mobile commerce research and applications,” Decision support systems, vol. 43, no. 1, pp. 3-15, 2007.

[2] Z. S. Chen, R. Li, X. Chen, and H. Xu, “A survey study on consumer perception of mobile-commerce applications,” Procedia Environmental Sciences," vol. 11, pp. 118-124, 2011.

[3] F. Liébana-Cabanillas, I. Ramos de Luna, and F. Montoro-Ríos, “Intention to use new mobile payment systems: a comparative analysis of SMS and NFC payments,” Economic research-Ekonomska istraživanja, vol. 30, no. 1, pp. 892-910, 2017.

[4] T. Falk, W. H. Kunz, J. J. Schepers, and A. J. Mrozek, “How mobile payment influences the overall store price image,” Journal of Business Research, vol. 69, no. 7, pp. 2417-2423, 2016.

[5] S. Karnouskos, “Mobile payment: a journey through existing procedures and standardization initiatives,” IEEE Communications Surveys & Tutorials, vol. 6, no. 4, pp. 44–66, 2004.

[6] N. Iman, “Is mobile payment still relevant in the fintech era?,” Electronic Commerce Research and Applications, vol. 30, pp. 72-82, 2018.

[7] G. Me, M. A. Strangio, and A. Schuster, "Mobile local macropayments: Security and prototyping," IEEE Pervasive Computing, vol. 5, no. 4, pp. 94-100, 2006.

[8] J. Gao, J. Cai, K. Patel, and S. Shim, "A wireless payment system," The 2nd. Conf. Embedded Software and Systems, pp. 8, 2005.

[9] S. Nambiar, C.T. Lu, and L.R. Liang, "Analysis of payment transaction security in mobile commerce," Proc. Information Reuse and Integration, pp. 475-480, 2004.

[10] I. C. Lin, and C. C. Chang, “A practical electronic payment system for message delivery service in the mobile environment," Wireless Personal Communications, vol. 42, no.2, pp. 247-261, 2007.

[11] J. T. Isaac, and J. S. Camara, "An anonymous account-based mobile payment protocol for a restricted connectivity scenario," The 18th. Int. Conf. Database and Expert Systems Applications, pp. 688-692, 2007.

[12] W. Guo, "Design of architecture for mobile payments system," Int. Conf. Control and Decision Conference, pp. 1732-1735, 2008.

[13] N. C. Liebau, V. Darlagiannis, A. Mauthe, and R. Steinmetz, "Token-based accounting for p2p-systems," Int. Conf. Kommunikation in Verteilten Systemen, Berlin, Heidelberg, 2005.

[14] R. Borgohain, M. T. Singh, C. Sakharwade, and S. Sanyal, "TSET: Token based secure electronic transaction," 2012.

[15] J. T. Isaac, and Z. Sherali, "Secure mobile payment systems," IT Professional, vol. 16, no. 3, pp. 36-43, 2014.

[16] L. Batten, and X. Yi, "Off-line digital cash schemes providing untraceability, anonymity and change," Electronic Commerce Research, pp. 1-30, 2018.

[17] D. E. Saputra, S. Sutikno, and S. H. Supangkat, "Peer-to-peer electronic cash using identity based signcryption," International Journal on Electrical Engineering and Informatics, vol. 10, no. 2, pp. 384-394, 2018.

[18] D. Flood, T. West, and D. Wheadon, "Trends in mobile payments in developing and advanced economies," RBA Bulletin, pp. 71-80, 2013.

[19] C. Thammarat, and W. Kurutach, “A secure fair exchange for SMS-based mobile payment protocols based on symmetric encryption algorithms with formal verification,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1-21, 2018.

[20] C. Thammarat, R. Chokngamwong, C. Techapanupreeda, and S. Kungpisdan, “A secure SMS mobile payment protocol ensuring fair exchange,” the 29th Int. Conf. Circuit/Systems Computers and Communications, pp. 163-166, 2014.

[21] P. Pukkasenung, and R. Chokngamwong, "Review and comparison of mobile payment protocol," Int. Conf. Advances in parallel and distributed computing and ubiquitous services, pp. 11-20, 2016.

[22] M. V. Alizade, R. A. Moghaddam, and S. Momenebellah, "New mobile payment protocol: Mobile pay center protocol (MPCP)," The 3rd Int. Conf. Electronics Computer Technology, pp. 74-78, 2011.

[23] F. Zamanian, H. and Mala, "A new anonymous unlinkable mobile payment protocol," Int. Conf. Computer and Knowledge Engineering, pp. 117-122, 2016.

[24] E. Ramezani, "Mobile payment," Lecture E-Business Technologies, BCM1, 2008.

[25] J. L. C. Lo, J. Bishop, and J. H. Eloff, "SMSSec: An end-to-end protocol for secure SMS," Computers & Security, vol. 27, no. 5-6, pp. 154-167, 2008.

[26] H. Rongyu, Z. Guolei, C. Chaowen, X. Hui, Q. Xi, and Q. Zheng, “A PK-SIM card based end-to-end security framework for SMS,” Computer Standards & Interfaces, vol. 31, no. 4, pp. 629-641, 2009.

[27] S. S. Ahamad, I. Al-Shourbaji, and S. Al-Janabi, "A secure NFC mobile payment protocol based on biometrics with formal verification," International Journal of Internet Technology and Secured Transactions, vol. 6, no. 2, pp. 103-132, 2016.

[28] D. Pal, P. Khethavath, T. Chen, and Y. Zhang, "Mobile payments in global markets using biometrics and cloud," International Journal of Communication Systems, vol. 30, no. 14, pp. 1-10, 2017.

[29] J. Lee, C. H. Cho, and M. S. Jun, "Secure quick response-payment (QR-pay) system using mobile device," The 13th Int. Conf. Advanced Communication Technology, pp. 1424–1427, 2011.

[30] V. Coskun, B. Ozdenizci, and K. Ok, "The survey on near field communication," Sensors, vol. 15, no. 6, pp. 13348-13405, 2015.

[31] K. Fan, C. Zhang, K. Yang, H. Li, and Y. Yang, "Lightweight NFC protocol for privacy protection in pobile IoT," Applied Sciences, vol. 8, no. 12, pp. 2506, 2018.

[32] Y. H. Tung, and W. S. Juang, "Secure and efficient mutual authentication scheme for NFC mobile devices," Journal of electronic science and technology, vol. 15, no. 3, pp. 240-245, 2017.

[33] N. E. Tabet, and M. A. Ayu, "Analysing the security of NFC based payment systems," Int. Conf. Informatics and Computing, pp. 169-174, 2016.

[34] C. Thammarat, and W. Kurutach, “A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification,” International Journal of Communication Systems, e3991, 2019.

[35] C. Thammarat, W. Kurutach, and S. Phoomvuthisarn, “A secure lightweight and fair exchange protocol for NFC mobile payment based on limited-use of session keys,” the 17th Int. Conf. Communications and Information Technologies, pp. 1-6, 2017.

[36] R. Tso, "Untraceable and anonymous mobile payment scheme based on near field communication," Symmetry, vol. 10, no. 12, pp. 685, 2018.

[37] E. O. Blass, A. Kurmus, R. Molva, and T. Strufe, "PSP: Private and secure payment with RFID," Computer Communications, vol. 36, no. 4, pp. 468-480, 2013.

[38] A. Ruiz-Martínez, J. A. Sánchez-Laguna, and A. F. Skarmeta, "Extending SIP to support payments in a generic way," Computer Standards & Interfaces, vol. 46, pp. 23-36, 2016.

[39] S. Kungpisdan, "Modelling, design, and analysis of secure mobile payment systems," PhD Thesis, School of Computer Science and Software Engineering, Monash University, 2005.

[40] R. Kailar. "Accountability in electronic commerce protocols," IEEE Trans Software Engineering, vol. 22, no. 5, 1996.

[41] S. Kungpisdan, "Accountability in centralized payment environments," In Communications and Information Technology, 2009. ISCIT 2009. 9th International Symposium on, pp. 1022-1027, 2009.

[42] J. Téllez, and S. Zeadally, “Mobile payment systems: secure network architectures and protocols,” Springer, 2017.

[43] W. Stallings, Cryptography and Network Security: Principles and Practice, 7th Edition, 2017.

[44] N. Janpitak and R. Montha, “The Blockchain-Based Cooperative Management System,” Journal of Information Science and Technology, Vol.9, No. 2, pp. 1-12, 2019.

[45] S. Duangphasuk and C. Thammarat, “A Secure SMS Authentication Based on Limited-Used Session Keys,” Journal of Information Science and Technology, Vol.6, No. 2, pp. 38-47, 2016.