Mobile Payment: A Review

Main Article Content

Surakarn Duangphasuk
Chalee Thammarat
Supakorn Kungpisdan


Currently, online business, especially e-commerce where buying and selling of goods and/or services are via the Internet, is being used widespread. It allows people to buy goods and/or services from anywhere at any time and get delivery to any location. Mobile commerce is one of the most popular types of electronic commerce. In this paper, we propose a literature review of current research results obtained by specialists and researchers area of the mobile payment.


Download data is not yet available.

Article Details

How to Cite
S. Duangphasuk, C. Thammarat, and S. Kungpisdan, “Mobile Payment: A Review”, JIST, vol. 10, no. 2, pp. 10-18, Dec. 2020.
Research Article: Networking (Detail in Scope of Journal)


[1] E. W. Ngai, and A. Gunasekaran, “A review for mobile commerce research and applications,” Decision support systems, vol. 43, no. 1, pp. 3-15, 2007.

[2] Z. S. Chen, R. Li, X. Chen, and H. Xu, “A survey study on consumer perception of mobile-commerce applications,” Procedia Environmental Sciences," vol. 11, pp. 118-124, 2011.

[3] F. Liébana-Cabanillas, I. Ramos de Luna, and F. Montoro-Ríos, “Intention to use new mobile payment systems: a comparative analysis of SMS and NFC payments,” Economic research-Ekonomska istraživanja, vol. 30, no. 1, pp. 892-910, 2017.

[4] T. Falk, W. H. Kunz, J. J. Schepers, and A. J. Mrozek, “How mobile payment influences the overall store price image,” Journal of Business Research, vol. 69, no. 7, pp. 2417-2423, 2016.

[5] S. Karnouskos, “Mobile payment: a journey through existing procedures and standardization initiatives,” IEEE Communications Surveys & Tutorials, vol. 6, no. 4, pp. 44–66, 2004.

[6] N. Iman, “Is mobile payment still relevant in the fintech era?,” Electronic Commerce Research and Applications, vol. 30, pp. 72-82, 2018.

[7] G. Me, M. A. Strangio, and A. Schuster, "Mobile local macropayments: Security and prototyping," IEEE Pervasive Computing, vol. 5, no. 4, pp. 94-100, 2006.

[8] J. Gao, J. Cai, K. Patel, and S. Shim, "A wireless payment system," The 2nd. Conf. Embedded Software and Systems, pp. 8, 2005.

[9] S. Nambiar, C.T. Lu, and L.R. Liang, "Analysis of payment transaction security in mobile commerce," Proc. Information Reuse and Integration, pp. 475-480, 2004.

[10] I. C. Lin, and C. C. Chang, “A practical electronic payment system for message delivery service in the mobile environment," Wireless Personal Communications, vol. 42, no.2, pp. 247-261, 2007.

[11] J. T. Isaac, and J. S. Camara, "An anonymous account-based mobile payment protocol for a restricted connectivity scenario," The 18th. Int. Conf. Database and Expert Systems Applications, pp. 688-692, 2007.

[12] W. Guo, "Design of architecture for mobile payments system," Int. Conf. Control and Decision Conference, pp. 1732-1735, 2008.

[13] N. C. Liebau, V. Darlagiannis, A. Mauthe, and R. Steinmetz, "Token-based accounting for p2p-systems," Int. Conf. Kommunikation in Verteilten Systemen, Berlin, Heidelberg, 2005.

[14] R. Borgohain, M. T. Singh, C. Sakharwade, and S. Sanyal, "TSET: Token based secure electronic transaction," 2012.

[15] J. T. Isaac, and Z. Sherali, "Secure mobile payment systems," IT Professional, vol. 16, no. 3, pp. 36-43, 2014.

[16] L. Batten, and X. Yi, "Off-line digital cash schemes providing untraceability, anonymity and change," Electronic Commerce Research, pp. 1-30, 2018.

[17] D. E. Saputra, S. Sutikno, and S. H. Supangkat, "Peer-to-peer electronic cash using identity based signcryption," International Journal on Electrical Engineering and Informatics, vol. 10, no. 2, pp. 384-394, 2018.

[18] D. Flood, T. West, and D. Wheadon, "Trends in mobile payments in developing and advanced economies," RBA Bulletin, pp. 71-80, 2013.

[19] C. Thammarat, and W. Kurutach, “A secure fair exchange for SMS-based mobile payment protocols based on symmetric encryption algorithms with formal verification,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1-21, 2018.

[20] C. Thammarat, R. Chokngamwong, C. Techapanupreeda, and S. Kungpisdan, “A secure SMS mobile payment protocol ensuring fair exchange,” the 29th Int. Conf. Circuit/Systems Computers and Communications, pp. 163-166, 2014.

[21] P. Pukkasenung, and R. Chokngamwong, "Review and comparison of mobile payment protocol," Int. Conf. Advances in parallel and distributed computing and ubiquitous services, pp. 11-20, 2016.

[22] M. V. Alizade, R. A. Moghaddam, and S. Momenebellah, "New mobile payment protocol: Mobile pay center protocol (MPCP)," The 3rd Int. Conf. Electronics Computer Technology, pp. 74-78, 2011.

[23] F. Zamanian, H. and Mala, "A new anonymous unlinkable mobile payment protocol," Int. Conf. Computer and Knowledge Engineering, pp. 117-122, 2016.

[24] E. Ramezani, "Mobile payment," Lecture E-Business Technologies, BCM1, 2008.

[25] J. L. C. Lo, J. Bishop, and J. H. Eloff, "SMSSec: An end-to-end protocol for secure SMS," Computers & Security, vol. 27, no. 5-6, pp. 154-167, 2008.

[26] H. Rongyu, Z. Guolei, C. Chaowen, X. Hui, Q. Xi, and Q. Zheng, “A PK-SIM card based end-to-end security framework for SMS,” Computer Standards & Interfaces, vol. 31, no. 4, pp. 629-641, 2009.

[27] S. S. Ahamad, I. Al-Shourbaji, and S. Al-Janabi, "A secure NFC mobile payment protocol based on biometrics with formal verification," International Journal of Internet Technology and Secured Transactions, vol. 6, no. 2, pp. 103-132, 2016.

[28] D. Pal, P. Khethavath, T. Chen, and Y. Zhang, "Mobile payments in global markets using biometrics and cloud," International Journal of Communication Systems, vol. 30, no. 14, pp. 1-10, 2017.

[29] J. Lee, C. H. Cho, and M. S. Jun, "Secure quick response-payment (QR-pay) system using mobile device," The 13th Int. Conf. Advanced Communication Technology, pp. 1424–1427, 2011.

[30] V. Coskun, B. Ozdenizci, and K. Ok, "The survey on near field communication," Sensors, vol. 15, no. 6, pp. 13348-13405, 2015.

[31] K. Fan, C. Zhang, K. Yang, H. Li, and Y. Yang, "Lightweight NFC protocol for privacy protection in pobile IoT," Applied Sciences, vol. 8, no. 12, pp. 2506, 2018.

[32] Y. H. Tung, and W. S. Juang, "Secure and efficient mutual authentication scheme for NFC mobile devices," Journal of electronic science and technology, vol. 15, no. 3, pp. 240-245, 2017.

[33] N. E. Tabet, and M. A. Ayu, "Analysing the security of NFC based payment systems," Int. Conf. Informatics and Computing, pp. 169-174, 2016.

[34] C. Thammarat, and W. Kurutach, “A lightweight and secure NFC-base mobile payment protocol ensuring fair exchange based on a hybrid encryption algorithm with formal verification,” International Journal of Communication Systems, e3991, 2019.

[35] C. Thammarat, W. Kurutach, and S. Phoomvuthisarn, “A secure lightweight and fair exchange protocol for NFC mobile payment based on limited-use of session keys,” the 17th Int. Conf. Communications and Information Technologies, pp. 1-6, 2017.

[36] R. Tso, "Untraceable and anonymous mobile payment scheme based on near field communication," Symmetry, vol. 10, no. 12, pp. 685, 2018.

[37] E. O. Blass, A. Kurmus, R. Molva, and T. Strufe, "PSP: Private and secure payment with RFID," Computer Communications, vol. 36, no. 4, pp. 468-480, 2013.

[38] A. Ruiz-Martínez, J. A. Sánchez-Laguna, and A. F. Skarmeta, "Extending SIP to support payments in a generic way," Computer Standards & Interfaces, vol. 46, pp. 23-36, 2016.

[39] S. Kungpisdan, "Modelling, design, and analysis of secure mobile payment systems," PhD Thesis, School of Computer Science and Software Engineering, Monash University, 2005.

[40] R. Kailar. "Accountability in electronic commerce protocols," IEEE Trans Software Engineering, vol. 22, no. 5, 1996.

[41] S. Kungpisdan, "Accountability in centralized payment environments," In Communications and Information Technology, 2009. ISCIT 2009. 9th International Symposium on, pp. 1022-1027, 2009.

[42] J. Téllez, and S. Zeadally, “Mobile payment systems: secure network architectures and protocols,” Springer, 2017.

[43] W. Stallings, Cryptography and Network Security: Principles and Practice, 7th Edition, 2017.

[44] N. Janpitak and R. Montha, “The Blockchain-Based Cooperative Management System,” Journal of Information Science and Technology, Vol.9, No. 2, pp. 1-12, 2019.

[45] S. Duangphasuk and C. Thammarat, “A Secure SMS Authentication Based on Limited-Used Session Keys,” Journal of Information Science and Technology, Vol.6, No. 2, pp. 38-47, 2016.