Article Preview
TopIntroduction
A mobile wallet is a complete payment application for NFC-enabled mobile phone that enables consumers to pay at stores at the point of sale with a mobile phone. The digital wallet, which is associated with a credit card, integrates all payment-related services like the management and storage of receipts, coupons and offers, and loyalty cards. With the rapid evolution of mobile technology, and an expanding base of mobile phone users, the mobile wallet has been recognized as having growth potential in the mobile commerce industry (Au & Kauffman, 2007). The industry strives to develop and build robust mobile commerce applications and at the same time provide an environment for secure, convenient, cost saving and efficient business transactions. A mobile wallet can support various transactions, including consumer-to-consumer, consumer-to-business, consumer-to-machine (i.e., paying for small-value transactions at a device such as a parking meter), and consumer-to-online. In addition, consumers have greater flexibility for settling transactions at the point of sale with mobile phone payments. Our proposed mobile wallet is a much-advanced and versatile application that includes elements of mobile transactions, as well as other items one may find in a wallet, such as debit cards, credit cards, membership cards, loyalty cards and travel cards. It also stores personal and sensitive information like passports, credit card information, PIN codes, online shopping accounts, booking details and insurance policies that can be encrypted or password-protected. Our proposed mobile wallet is loaded inside the UICC (Universal Integrated Circuit Card) of the mobile phone called UICC Wallet, which stores data in a UICC. The UICC is the smart card used in mobile phone in GSM or UMTS networks. Since it is a smart card, it inherits all the security features of smart cards. It provides a secure storage of data.
The remainder of the article is as follows: First, we give a literature review of mobile wallets, gaps found in the literature and contributions made by us. Then we propose a Secure Mobile Wallet Framework SMWF based on NFC. Next we present Security analysis of our proposed mobile payment protocol in SMWF. Followed by a comparative analyses of the proposed framework with the literature review (Table 1). Afterwards we present Formal Verification of the Proposed Protocol‘s Security using AVISPA and SCYTHER TOOLS. Finally we then conclude our work. We provide some explanations of notations and abbreviations in the Appendix (Tables 2 and 3).
Table 1. Comparative analysis of SMWF protocol with the literature
Protocols Features | Google Wallet 2011 | NTT DoCoMo 2012 | Labrou et al., 2004 | Steffens et al., 2009 | Zhao & Muftic, 2011 | Our’s |
Authentication | Yes | Yes | Yes | Yes | Yes | Yes |
Confidentiality | Yes | Yes | Yes | Yes | Yes | Yes |
Integrity | Yes | Yes | Yes | Yes | Yes | Yes |
Non-Repudiation | Yes | Yes | Yes | Yes | Yes | Yes |
Client’s credentials are generated using OBKG procedure | No | No | No | No | No | Yes |
WPKI is implemented in the memory of Mobile Phone | No | No | No | No | No | Yes |
Ensures reliable and Secure end to end communication | No | No | No | No | No | Yes |
Ensures end to end Security at application level | No | No | No | No | No | Yes |
Proposed for Proximity (NFC) Mobile Payments | No | No | No | No | No | Yes |
Identity Protection from Eavesdropper | No | No | No | No | No | Yes |
Transaction Privacy Protection from Eavesdropper | No | No | No | No | No | Yes |
Transaction Privacy Protection from PG | No | No | No | No | No | Yes |
Prevents Double Spending | Nr | Nr | Nr | Nr | Nr | Yes |
Prevents Over spending | Nr | Nr | Nr | Nr | Nr | Yes |
Prevents Money Laundering | Nr | Nr | Nr | Nr | Nr | Yes |
Withstands Replay Attack | Yes | Yes | No | No | No | Yes |
Withstands Impersonation Attack | Yes | Yes | No | No | No | Yes |
Withstands MITM Attack | Yes | Yes | No | No | No | Yes |
Prone to Attacks | Yes | Yes | Yes | Yes | Yes | No |
Formal Verification using AVISPA & SCYTHER TOOL | No | No | No | No | No | Yes |
Biometric Authentication is ensured at the client’s side | No | No | No | No | No | Yes |
Ensures Fair Exchange | No | No | No | No | No | Yes |
Biometric Solution is proposed in a separate smart card | No | No | No | No | No | Yes |