Publication | Closed Access
Study of mobile payment protocols and its performance evaluation on mobile devices
11
Citations
13
References
2010
Year
Mobile SecurityNear Field CommunicationEngineeringMobile Payment ProtocolsMobile DevicesComputational CostHardware SecurityFintechMobile Payment ProtocolPayment SystemInternet Of ThingsSecure ProtocolAuthentication ProtocolLightweight Authentication MechanismMobile ComputingComputer ScienceMobile CommerceData SecurityCryptographyMobile Computing SystemMobile IpEdge ComputingBusiness
Mobile payment protocols must provide security services (e.g., authentication, authorisation, integrity, privacy and non-repudiation), but the features of mobile devices make it a difficult task, especially when the service requires to perform public key operations. It is very well known, that the public key operations require high execution time of the CPU and battery consumption. In this paper, we computed the computational cost required by each entity in five mobile payment protocols. In addition, we computed the transmission time of each message among different entities. The exchange of message was done using Bluetooth technology. The performance evaluation of each mobile payment protocol defines its feasibility according with the whole time expending during the protocol considering its computational cost and transmission time.
| Year | Citations | |
|---|---|---|
Page 1
Page 1