Related Academic Work

In order to fully understand the market and develop the Social Payment System, we firstly researched the related academic works to micropayment system. From this research, we were able to learn about micropayment system efficiently and design our QuidLink social payment system. In addition, we were able to build up some example scenarios and personas, and to carry out the security anlaysis. (Kiran, 2012) [1]

Related Work

Zhi-Yuan Hu [2] made a practical system, Anonymous Micropayments Authentication (AMA), is available for micropayment system. But there are authentication mechanism problems in his work referring to symmetric key cryptography.

Samad [3] has introduced a trust model which is satisfaction service for users. If users are not satisfied, the micropayment provider would not charge for the product.

Min-Shiang [4] and Husna Osman and Hamish Taylor [5] have proposed several micropayment schemes to achieve three goals: micro-payment multiple transactions, service providers, and anonymity.

Sung-Ming e.t. al [6] has proposed diverse probabilistic micropayment Scheme which may reduce the administrative cost of the bank. However, merchants can have enormous benefits from this scheme.

Mohammad Al-Fayoumi [7] and Kaylash Chaudhary e.t. al [8] have carried out an assessment of micropayment and examine its advantages and limitations, which improves the scheme of the micropayment security robustness.

Panjwani [9] has examined two token-based verification techniques, designed for authenticating clients in financial techniques applied over cellular systems. The first plan is currently applied in Indian by a cellular financial service agency known as Eko with a achieve of over 50,000 clients. The second plan was suggested lately (in combined effort with Eko) to fix weak points in the first one, and is now being regarded for implementation. Both techniques depend on PINs and printed codebooks (which are unique per user) for verification. Chaix [10] examines the economic designs associated to different mobile-payment techniques.

 

References

[1] Kiran N.C., Kumar, N. (2012). “Implication of Secure Micropayment System Using Process Oriented Structural Design by Hash chaining in Mobile Network”, IJCSI International Journal of Computer Science Issues, Vol. 9, pp, no 2

[2] Zhi-Yuan Hu, Yao-Wei Liu, Xiao Hu, Jian-Hua Li, Anonymous Micropayments Authentication (AMA) in Mobile Data Network, INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies Iss: 7 March 2004,

[3] Samad Kardan and Mehdi Shajari, A Lightweight Buyer’s Trust Model for Micropayment Systems, WSEAS Transactions on Information Science & Applications, 2008

[4] Min-Shiang Hwang, Pei-Chen Sung, A Study of Micropayment Based on One-Way Hash Chain, International Journal of Network Security, Vol.2, No.2, PP.81–90, Mar. 2006

[5] Husna Osman, Hamish Taylor, Design of a Reputation System for M-Commerce by Ad Hoc Networking, “Design of a reputation system for m-commerce by adhoc networking,” Technical Report, Dept. of Computer Science, Heriot-Watt University, 2010, pp-1-7

[6] Sung-Ming Yen, Chien-Ning Chen, Hsi-Chung Lin, Jui-Ming Wu, and Chih-Ta Lin, Improved Probabilistic Micropayment Scheme, Journal of Computers Vol.18, No.4, January 2008

[7] Mohammad Al-Fayoumi, Sattar Aboud and Mustafa Al-Fayoumi, Practical E-Payment Scheme, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 7, May 2010

[8] Kaylash Chaudhary, Xiaoling Dai and John Grundy, Experiences in Developing a Micro-payment System for Peer-to-Peer Networks, International Journal of Information Technology and Web Engineering, vol. 5, no. 1, 2010

[9] Saurabh Panjwani, Prasad Naldurg, Raghav Bhaskar, “Analysis of Two Token-Based Authentication Schemes for Mobile Banking”, Technical Report of Microsoft Research, 2010

Article written by

Please comment with your real name using good manners.

Leave a Reply