Accountability Analysis of Mobile Payment Protocol

protocol concerns about the ability to show that particular parties are responsible for transactions. Particularly, engaging parties must be able to prove to a dispute resolver (verifier) that they are honest for the transaction relevant to them. With the advent of electronic and mobile commerce, cryptographic protocols are being adapted for implementing commercial transactions, and there is a need to provide accountability for protocol participants. Four accountability logics have been selected and further discussed in terms of their strengths and weaknesses in analyzing the accountability of mobile payment protocol. These includes: BAN Logic, Kailar's Logic, Kessler and Neumann's (KN) Logic and Kungpisdan's (KP) Logic. The findings revealed that Kungpisdan's (KP) Logic is most appropriate to analyze mobile payment transaction in wireless and mobile networks. The proposed mobile payment protocol has been analyzed against the Kungpisdan's (KP) Logic and the result revealed that the proposed protocol achieved the accountability property in mobile transaction. The future work will concentrate on improving the key generation techniques and symmetric key exchange schemes.

[1]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[2]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Rajashekar Kailar,et al.  Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..

[4]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[5]  Heike Neumann,et al.  A Sound Logic for Analysing Electronic Commerce Protocols , 1998, ESORICS.

[6]  Supakorn Kungpisdan,et al.  Practical Reasoning about Accountability in Electronic Commerce Protocols , 2001, ICISC.

[7]  Reiner Dojen,et al.  Formal verification: an imperative step in the design of security protocols , 2003, Comput. Networks.

[8]  Sujeet Shenoi,et al.  Integrating Logics and Process Calculi for Cryptographic Protocol Analysis , 2003, SEC.

[9]  Bala Srinivasan,et al.  Accountability logic for mobile payment protocols , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[10]  Mauricio Papa,et al.  Cryptographic protocol analysis using goal extraction , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[11]  Leau Yu Beng,et al.  Privacy in New Mobile Payment Protocol , 2008 .