Abstract
Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well suited to this scenario since they are specifically designed for efficient operation. Most micropayment schemes require a digital signature and therefore users must support public key operations and, furthermore, a public key infrastructure must be available. Such schemes are not suitable for current wireless systems since public key technology is not supported. We examine the SVP micropayment scheme which overcomes this problem by using only symmetric key cryptography and relying on tamper resistance. Some limitations are observed in the SVP micropayment scheme and an enhanced scheme is proposed suitable for current generation wireless communications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Vijay Ahuja, Secure Commerce on the Internet, Academic Press, 1996.
Ross Anderson, Harry Manifavas, and Chris Sutherland, “A practical electronic cash system”, Personal Communication, December 1995.
ASPeCT, Initial Report on Security Requirements, AC095/ATEA/W21/ DS/P/02/B, February 1996.
ASPeCT, Secure billing: evaluation report, AC095/SAG/W25/DS/P/16/ 1, May 1997.
K. Buhanal, et al., “IMT-2000: Service Providers’ Perspective”, IEEE Personal Communications, August 1997.
Marilyn Greenstein and Todd M Feinman, Electronic Commerce: Security, Risk Management and Control, McGraw-Hill, 1999, p. 2.
G. Horn and B. Preneel, “Authentication and payment in future mobile systems”, Computer Security-ESORICS’98, Lecture Notes in Computer Science, 1485, 1998, pp. 277–293.
Ralf Hauser, Michael Steiner, and Michael Waidner, Micro-Payments based on iKP, IBM Zurich Research Lab. Available as http://www.zurich.ibm.ch/Technology/Security/publications/1996/HSW96.ps.gz
ITU, Recommendation ITU-R M.1223, Evaluation of Security Mechanisms for IMT-2000, 1997.
L. Lamport, “Password authentication with insecure communication”, Communications of the ACM, 24(11), 770–771, Nov 1981.
K.M. Martin and C.J. Mitchell, “Evaluation of authentication protocols for mobile environment value-added services”, Journal of Computer Security, to appear. Available online from http://isg.rhbnc.ac.uk/cjm/Chris_Mitchell.htm.
A. Mehrota, GSM System Engineering, Artech House, 1997.
C.J. Mitchell, “Security in Future Mobile Networks”, Second International Workshop on Mobile Multi-Media Communications (MoMuC-2), Bristol, April 1995.Also available online at http://isg.rhbnc.ac.uk/cjm/SIFMW.ZIP.
Seshadri Mohan, “Privacy and Authentication Protocols for PCS”, IEEE Personal Communications, October 1996, pp.34–38.
K.M. Martin, B. Preneel, C.J. Mitchell, H.J. Hitz, G. Horn, A. Poliakova, and P. Howard, “Secure billing for mobile information services in UMTS”,in: S. Trigila, A. Mullery, M. Campolargo, H. Vanderstraeten and M. Mampaey (eds.), Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services (Proceedings of the Fifth International Conference, IS&N 98, Antwerp, Belgium, May (1998), Springer-Verlag (LNCS 1430), pp.535–548.
T. Ojanpera and R. Prasad, “IMT-2000 Applications”,in Wideband CDMA for Third Generation Mobile Communication, T Ojanpera and R. Prasad (ed.), Artech House, 1998, pp. 65–76.
T. P. Pedersen, “Electronic payments of small amounts”, DAIMI PB-495, Computer Science Department, Aarhus University, August 1995.
S.M. Redl et al., GSM and Personal Communications Handbook, Artech House Publishers, 1998.
R. L. Rivest and A Shamir, “PayWord and MicroMint: Two simple micropayment schemes”, Cryptobytes, Vol. 2No. 1, May 1996, pp7–11. Available from http://theory.lcs.mit.edu/~rivest
Jacques Stern and Serge Vaudenay, “SVP: a Flexible Micropayment Scheme”, Financial Crypto’ 97, pp.161–171, Springer-Verlag, 1997.
The Technical Advisory Committee to Develop a Federal Information Processing Standard for the Federal Key Management Infrastructure, Requirements for Key Recovery Products, available at http://csrc.nist.gov/keyrecovery.
Peter Wayner, Digital Cash: Commerce on the Net, Academic Press, 2nd Edition, 1997.
M. Wiener, “Performance Comparison of Public-Key Cryptosystems”, Cryptobytes, Vol. 1, No. 2, RSA Laboratories, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, D., Boyd, C., Dawson, E. (2001). Micropayments for Wireless Communications. In: Won, D. (eds) Information Security and Cryptology — ICISC 2000. ICISC 2000. Lecture Notes in Computer Science, vol 2015. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45247-8_16
Download citation
DOI: https://doi.org/10.1007/3-540-45247-8_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41782-8
Online ISBN: 978-3-540-45247-8
eBook Packages: Springer Book Archive