Identity Authentication Security Management in Mobile Payment Systems

Identity Authentication Security Management in Mobile Payment Systems

Feng Wang (School of Management, Jilin University, Changchun, China), Ge Bao Shan (School of Management, Jilin University, Changchun, China), Yong Chen (School of Business, Texas A&M International University, Laredo, USA), Xianrong Zheng (Department of Information Technology and Decision Sciences, Old Dominion University, Norfolk, USA), Hong Wang (College of Business and Economics, North Carolina A&T State University, Greensboro, USA), Sun Mingwei (Public Education and Teaching Department, Changchun Automobile Industry Institute, Changchun, China) and Li Haihua (School of Management Science and Information Engineering, Jilin University of Finance and Economics, Changchun, China)
Copyright: © 2020 |Pages: 15
DOI: 10.4018/JGIM.2020010110
Article PDF Download
Open access articles are freely available for download


Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its electronic and wireless nature. Therefore, biometric authentication has been adopted widely in mobile payment in recent years. However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available. The flow management of user authentication in mobile payment is still at its early stage. Accordingly, this paper proposes an anonymous authentication and management flow for mobile payment to support secure transaction to prevent the disclosure of users' information and to reduce identity theft. The proposed management flow integrates transaction key generation, encryption and decryption, and matching to process users' personal information and biometric characteristics based on mobile equipment authentication carrier.
Article Preview

1. Introduction

The advent of electronic commerce, the growth of the Internet, and the development of wireless technologies promoted various payment methods in the past two decades (Assarzadeh and Aberoumand, 2018; Hassani, Huang, and Silva, 2018; Khan, Olanrewaju, Baba, Langoo, and Assad, 2017; Oliverio 2018; Viriyasitavat and Hoonsopon, 2018; Whitmore et al 2015). Particularly, the astonishing growth of mobile network and mobile devices make mobile payment globally applicable (De Vriendt, Lainé, Lerouge, and Xu, 2002; Paunov and Vickery, 2006). Wireless technologies, such as Near Field Communication (NFC), Bluetooth, Quick Response (QR) Code, and Radio Frequency Identification (RFID), enable consumers to process payment over mobile networks with their mobile devices for both online purchases and offline micropayments (Khan, Olanrewaju, Baba, Langoo, and Assad, 2017). Mobile payment is changing the payment market (Hedman and Henningsson, 2015) and becomes an alternative to using cash, check, credit cards, or debit cards at a retail point of sale (Chen, 2008). In emerging economies where penetration of formal banking system is low, mobile payment has been well accepted (Khan, Olanrewaju, Baba, Langoo, and Assad, 2017). According to Statista (2018), worldwide transaction value with mobile payment amounts to $391.435 billion in 2018. Transaction value via mobile payment is expected to grow 35.7% annually from 2018 to 2022. The total amount of transaction value via mobile payment will be $1,328.244 billion in 2022.

Mobile payment provides users mobility, reachability, compatibility, and convenience (Kim, Mirusmonov, & Lee, 2010). It frees consumers from temporal and spatial limitations and enables them to make payment at anytime from anywhere (Yan and Yang, 2015; Zhou, 2015). However, mobile payment involves great uncertainty and risk due to its electronic and wireless nature (Leong, Ewing, & Pitt, 2003). Mobile networks are vulnerable to hacker attack and mobile devices may be infected by viruses or be lost (Zhou, 2015). For example, when mobile payment users connect their mobile devices with unsafe Wi-Fi, the authentication of their information might be intercepted (Chen & Chen, 2012; Li & Liu, 2014; Zhou, 2014). When mobile devices are lost or stolen, the stored sensitive information may fall into the wrong hands (Xi, Ahmad, Han, & Hu, 2011). Thus, security is a major concern among mobile payment users (Chen, 2018; Dahlberg, Guo, & Ondrus, 2015).

Complete Article List

Search this Journal:
Volume 30: 12 Issues (2022)
Volume 29: 6 Issues (2021)
Volume 28: 4 Issues (2020)
Volume 27: 4 Issues (2019)
Volume 26: 4 Issues (2018)
Volume 25: 4 Issues (2017)
Volume 24: 4 Issues (2016)
Volume 23: 4 Issues (2015)
Volume 22: 4 Issues (2014)
Volume 21: 4 Issues (2013)
Volume 20: 4 Issues (2012)
Volume 19: 4 Issues (2011)
Volume 18: 4 Issues (2010)
Volume 17: 4 Issues (2009)
Volume 16: 4 Issues (2008)
Volume 15: 4 Issues (2007)
Volume 14: 4 Issues (2006)
Volume 13: 4 Issues (2005)
Volume 12: 4 Issues (2004)
Volume 11: 4 Issues (2003)
Volume 10: 4 Issues (2002)
Volume 9: 4 Issues (2001)
Volume 8: 4 Issues (2000)
Volume 7: 4 Issues (1999)
Volume 6: 4 Issues (1998)
Volume 5: 4 Issues (1997)
Volume 4: 4 Issues (1996)
Volume 3: 4 Issues (1995)
Volume 2: 4 Issues (1994)
Volume 1: 4 Issues (1993)
View Complete Journal Contents Listing