Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
3Activity

Table Of Contents

Abstract
Acknowledgements
4 Short list of abbreviations
5 Introduction
5.1 Thesis scope
5.2 Contributions
5.2.1 Contribution list
5.3 Research Methodology
5.4 Development Model
6 Background
6.1 Mobile devices in the world
6.2 Mobile payment
6.2.1 Would mobile payments be successful?
6.2.2 Would people use mobile payment?
6.3 Mobile payments methods
6.3.1.1 Pre-paid method
6.3.1.2 Post-paid method
6.3.1.3 Real-time method
6.4 Assessment
7 Technologies
7.1 Public Key Infrastructure (PKI) and Wireless PKI (WPKI)
7.2 Public Key Infrastructure (PKI)
7.2.1 The actors in a PKI
7.2.2 PKI Enrolment
7.2.3 PKI Enrolment Process
Figure 1: Simplified enrolment scheme
7.2.4 Encryption and signatures
7.2.5 Certificate revocation
7.2.6 Web of trust
7.3 Wireless Public Key Infrastructure (WPKI)
Figure 2: WPKI Roles15
7.3.1 WPKI Concept
7.3.2 WPKI SIM Card
7.3.3 Hard vs. Soft
7.3.4 Public keys
7.3.5 WPKI Stages
7.3.6 WPKI stage: Pre-enrolment
Figure 3: WPKI Pre-enrolment scheme17
7.3.7 WPKI stage: Enrolment
Figure 4: WPKI Enrolment scheme18
7.3.8 WPKI stage: Usage
Figure 5: WPKI Usage scheme19
7.3.9 WPKI stage: Termination
7.3.10 RA/CA Revocation
7.3.11 MO termination
7.4 PKI and WPKI Summary
7.4.1 Differences between PKI and WPKI
7.4.2 Enforcing mobile security with WPKI
7.4.3 Enforcing system security with PKI
7.4.4 WPKI alternatives
7.5 Comparison between Wireless Technologies
7.5.1 Basic Functions of Near Field Communication (NFC)
7.5.1.1 Card Emulation mode
7.5.1.2 Read/write Emulation mode
7.5.1.3 Peer-to-Peer mode
7.5.1.4 NFC Data Exchange Format (NDEF)
Table 1: NDEF message format21
7.5.2 NFC characteristics
Table 2: NFC Modes23
7.5.2.1 NFC vulnerabilities
7.5.2.1.1 DoS Attack
7.5.2.1.2 Eavesdropping
7.5.2.1.3 Data Modification
7.5.2.1.4 Data Insertion
7.5.2.2 NFC non-vulnerabilities
7.5.2.2.1 Man-in-the-Middle
7.5.3 Bluetooth
7.5.3.1 Denial of Service (DoS)
7.5.3.2 Bluejacking
7.5.3.3 Bluesnarfing
7.5.3.4 Bluebugging
7.5.3.5 Packet Format
Table 3: Bluetooth packet format 28
7.5.4 Infrared Data Association (IrDA)
7.5.4.1 IrDA layers
7.5.4.2 IrDA security
7.5.5 Summary of wireless technologies
Table 4: Comparison of wireless technologies
7.6 Hardware
7.6.1 Nokia 6131 NFC
7.6.2 ACR122 NFC Contactless Smart Card Reader
8 Foundations, Design and Implementation
8.1 Functionality overview
8.1.1 Seller Hardware
8.1.2 Seller
8.1.3 Client
8.1.4 Service Provider
8.1.5 Statistics Handler
8.1.6 CA
8.1.7 MO
8.1.8 FinInst
8.2 Financial Institutions
8.2.1 Requirements and assumptions
8.3 Enrolment Procedure Design
8.3.1 Seller enrolment
8.3.2 User enrolment
8.3.3 Contract signing
8.3.4 Client software installation
8.4 Cancelling the subscription, Un-enrolling design
8.4.1 Seller un-enrolment
8.4.2 User un-enrolment
8.5 Billing model
Table 5: Mobile Internet costs35
8.6 Communication model
8.6.1 Communication channels
8.6.2 Communication channel implementation
8.6.3 Communication recoverability and reliability
8.6.3.1 System communication channel
8.6.3.1.1 System communication channel security
8.6.3.1.2 Client system communication channel
8.6.3.2 Local wireless communication channel
8.6.4 Maps
8.6.4.1 Communication using Maps
8.6.4.2 Securing the maps
8.6.4.3 Maps in the Client
8.6.4.4 Problems integrating Client communication
8.7 Communication formats
Figure 6: ClientConfirmation format
Figure 7: ReturnConfirmation format
Figure 9: SellerReceipt format
Figure 10: ClientReceipt format
8.8 Purchase Design – Use Cases
8.8.1 City store case
8.8.2 Future case
8.8.3 Country store case
8.8.4 Vendor machine case
8.9 Cancelling purchases
8.9.1 Cancellations in city store case
8.9.2 Cancellations in future case
8.9.3 Cancellations in country store case
8.9.4 Cancellations in vending machine case
9 Testing
9.1 Test scope
9.2 Test setup
10 Results
10.1 Usability
Figure 11: Additional views for demo only
Figure 12: Welcome view
Figure 14: Purchase list City/Country
Figure 15: Fulfil purchase windows
Figure 16: Usability questionnaire
10.1.1 System performance
Table 6: Service Provider test results
10.1.1.1 NFC Transfers
Table 7: NFC transfer calculations
10.2 Supportability & Reliability
Table 8: Number of tests on each test case
Table 9: Test results
Table 10: Consistency in FinInst database
10.3 Consistency
10.3.1 Consistency enforced by rollbacks
Table 11: Urban account balance before purchase test
Table 12: Urban account balance during purchase test
Table 13: Urban account balance after an aborted purchase test
Table 14: Urban account balance after a successful purchase test
10.4 Recoverability
Figure 17: Recoverability flow
Figure 18: Recoverability system output A
Figure 19: Recoverability system output B
10.5 Security
10.5.1 SSL
Figure 20: SSL traffic capture
Figure 21: Non-SSL traffic capture
10.5.2 PKI Signatures
Figure 22: Shopping list
Figure 23: Signature error
11 Conclusion
11.1 Supportability
11.2 Reliability
11.2.1 Consistency and Recoverability
11.3 Security
11.4 Performance
11.5 Usability
11.6 Conclusion summary
12 Future work
12.1 Internationalization
12.2 Banks and financial institutions
12.3 User enrolment process
12.4 Seller enrolment process
12.5 Mobile Service Provider optional enrolment
12.6 Unenrolment processes
12.7 Web portal
13 Reference list
0 of .
Results for:
No results containing your search query
P. 1
Imp Thesis on Mobile Wallet Payment Solution

Imp Thesis on Mobile Wallet Payment Solution

Ratings: (0)|Views: 320|Likes:

More info:

Published by: prudviraj.bv@gmail.com on Apr 22, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/14/2012

pdf

text

original

You're Reading a Free Preview
Pages 5 to 81 are not shown in this preview.
You're Reading a Free Preview
Pages 86 to 87 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->