Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this
0 of .
Results for:
No results containing your search query
P. 1
Mobile Payment

Mobile Payment

|Views: 181|Likes:
Published by ArvinNundloll

More info:

Published by: ArvinNundloll on Aug 18, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Master ThesisComputer ScienceThesis no: MCS-2008:6  January 2008
Department of Systems and Software EngineeringSchool of EngineeringBlekinge Institute of TechnologyBox 520SE – 372 25 RonnebySweden
Mobile payment withcustomer controlled connection
- Can it be constructed to be safe enough?
Samuel Ivarsson
This thesis is submitted to the Department of Systems and Software Engineering, School of Engineering at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies.
Contact Information:
Author(s):Samuel IvarssonE-mail: samuel.ivarsson@gmail.comExternal advisor(s):Johan Persbeck 
Cybercomgroup Sweden South
Address:Campus Gräsvik 1, 37141 KarlskronaUniversity advisor(s):Martin BoldtThe Department of Systems and Software EngineeringDepartment of Systems and Software EngineeringBlekinge Institute of TechnologyBox 520SE – 372 25 RonnebyInternet: www.bth.se/tek Phone: +46 457 38 50 00Fax: + 46 457 102 45
The mobile commerce has given birth to manymobile payment systems and this thesis covers thesecurity of a theoretical system where thecommunication is handled by the customer. There aremany technologies that can be used when implementingsuch a system, each with different strengths andweaknesses. The system designed in this project wasconstructed for micropayments in vending machinesthat has no connection to the vendor except for theconnection supplied by the customer. The design wasthen used for analyzing the threats against the designedsystem and comparing it to an identical system wherethe connection is supplied by the seller in order to findout the effects on security when changing thecommunication channel. The comparison shows thateven though the designed system is more vulnerable, itis not a major difference and with low value payments,the mobile payment system can depend on theconnection supplied by the user. The main advantagesto security with this method is the protection againstDenial of Service attacks and the protection againstmass identity thefts as authentication is no longer doneon the machine.
Mobile, payment, security1

Activity (14)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Sidney Kibet liked this
Lebnan Nader liked this
via_amiko liked this
Slobodan Kaludjerovic liked this
jainiti.prasad liked this
David Khim liked this
Balvinder Singh liked this
via_amiko liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->