Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
14Activity
P. 1
Mobile Payment

Mobile Payment

Ratings: (0)|Views: 163 |Likes:
Published by ArvinNundloll

More info:

Published by: ArvinNundloll on Aug 18, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/14/2012

pdf

text

original

 
Master ThesisComputer ScienceThesis no: MCS-2008:6  January 2008
Department of Systems and Software EngineeringSchool of EngineeringBlekinge Institute of TechnologyBox 520SE – 372 25 RonnebySweden
Mobile payment withcustomer controlled connection
- Can it be constructed to be safe enough?
Samuel Ivarsson
 
This thesis is submitted to the Department of Systems and Software Engineering, School of Engineering at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies.
Contact Information:
Author(s):Samuel IvarssonE-mail: samuel.ivarsson@gmail.comExternal advisor(s):Johan Persbeck 
Cybercomgroup Sweden South
Address:Campus Gräsvik 1, 37141 KarlskronaUniversity advisor(s):Martin BoldtThe Department of Systems and Software EngineeringDepartment of Systems and Software EngineeringBlekinge Institute of TechnologyBox 520SE – 372 25 RonnebyInternet: www.bth.se/tek Phone: +46 457 38 50 00Fax: + 46 457 102 45
i
 
A
BSTRACT
The mobile commerce has given birth to manymobile payment systems and this thesis covers thesecurity of a theoretical system where thecommunication is handled by the customer. There aremany technologies that can be used when implementingsuch a system, each with different strengths andweaknesses. The system designed in this project wasconstructed for micropayments in vending machinesthat has no connection to the vendor except for theconnection supplied by the customer. The design wasthen used for analyzing the threats against the designedsystem and comparing it to an identical system wherethe connection is supplied by the seller in order to findout the effects on security when changing thecommunication channel. The comparison shows thateven though the designed system is more vulnerable, itis not a major difference and with low value payments,the mobile payment system can depend on theconnection supplied by the user. The main advantagesto security with this method is the protection againstDenial of Service attacks and the protection againstmass identity thefts as authentication is no longer doneon the machine.
Keywords:
Mobile, payment, security1

Activity (14)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Sidney Kibet liked this
Lebnan Nader liked this
via_amiko liked this
jainiti.prasad liked this
David Khim liked this
Balvinder Singh liked this
via_amiko liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->