Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Design and implementation of mobile e-commerce application built on WAP mobile payment system

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

With the development of science and technology and the popularization of e-commerce, the application of wireless network technology in the business field has gradually become a hot spot of academic research, which also brings us new topics and challenges. The secure payment system based on the improved TOTP algorithm proposed in this paper involves the WAP wireless secure payment theory and the application of mobile e-commerce. This paper first studies the WAP wireless network theory of mobile payment system, and proposes the WAP algorithm flow based on identity encryption. Then, the secure wireless execution environment of the WAP encryption payment algorithm is analyzed in depth. This paper discusses the security requirements of the WAP wireless network payment system. Based on the identity encryption algorithm, several practical algorithms are proposed, and a wireless network mobile payment model combining NTRU and ECC is constructed to improve the WAP algorithm. This paper proposes a WAP wireless network security payment system based on the improved TOTP algorithm, constructs its overall structure, and designs a core algorithm with strong adaptability, including the improved TOTP algorithm and risk assessment algorithm. Finally, the performance of the WAP e-commerce secure payment system is tested and analyzed. The research found that when the 256-bit key was used to encrypt the login information, the number of tests was 23,588, the number of concurrent threads was 200, the number of requests per second was 518, the average response time was 0.219 s, the average traffic was 500 KB/s, and the error rate was 2%. It can be seen from the data that the WAP wireless secure payment system operates normally with low network delay and can respond to operation requests quickly under the condition of concurrent access by multiple users, with strong overall pressure resistance. The work of this paper has a good reference value for the construction of the WAP wireless network payment system and the design and application of mobile e-commerce, which is conducive to further research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

The experimental data used to support the findings of this study are available from the corresponding author upon request.

References

  1. Jiang, M. (2017). WAP based mobile e-commerce security scheme. Computer Knowledge and Technology, 2.

  2. Waqas, M., Tu, S., Halim, Z., et al. (2022). The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges. Artificial Intelligence Review, 55(7), 5215–5261.

    Article  Google Scholar 

  3. Ramana, S., Ramu, S. C., Bhaskar, N., Murthy, M. R., & Reddy, C. R. A three-level gateway protocol for secure m-commerce transactions using encrypted OTP. In 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC) (pp. 1408–1416). IEEE.

  4. Xiao, Z. (2009). Overview of mobile internet research. Telecommunications Science, 25(10), 30–36.

    Google Scholar 

  5. Bojjagani, S., Rao, P. V. V., Vemula, D. R., et al. (2022). A secure IoT-based micro-payment protocol for wearable devices. Peer-to-Peer Networking and Applications, 15(2), 1163–1188.

    Article  Google Scholar 

  6. Abolfathi, M., Shomorony, I., Vahid, A., & Jafarian, J. H. (2022). A game-theoretically optimal defense paradigm against traffic analysis attacks using multipath routing and deception. In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies (67–78).

  7. Cai, T., Chen, W., Psannis, K. E., et al. (2022). Scalable on-chain and off-chain blockchain for sharing economy in large-scale wireless networks. IEEE Wireless Communications, 29(3), 32–38.

    Article  Google Scholar 

  8. Yue, Z. (2007). Research on mobile payment operation mode and market diffusion. China New Communications, 9(22), 77–78.

    Google Scholar 

  9. Bhutta, M. N. M., Bhattia, S., Alojail, M. A., et al. (2022). Towards secure IoT-based payments by extension of payment card industry data security standard (PCI DSS). Wireless Communications and Mobile Computing, 2022, 1–10.

    Article  Google Scholar 

  10. Abdullah, K. (2010). Comparison between the RSA cryptosystem and elliptic curve cryptography. The University of Waikato.

  11. Ray, S., Biswas, G. P., & Dasgupta, M. (2016). Secure multi-purpose mobile-banking using elliptic curve cryptography. Wireless Personal Communications, 90(3), 1331–1354.

    Article  Google Scholar 

  12. Hu, J., Weng, X., Yang, L., Lei, S., & Niu, H. (2022). Centrifugal modeling test on failure characteristics of soil-rock mixture slope under rainfall. Engineering Failure Analysis, 142, 106775.

    Article  Google Scholar 

  13. Jana, B., & Poray, J. A performance analysis on elliptic curve cryptography in network security. In 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE) (pp. 1–7). IEEE.

  14. Singh, S. R., Khan, A. K., & Singh, S. R. Performance evaluation of RSA and elliptic curve cryptography. In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) (pp. 302–306). IEEE.

  15. Ekberg, J. E., Kostiainen, K., & Asokan, N. (2014). The untapped potential of trusted execution environments on mobile devices. IEEE Security & Privacy, 12(4), 29–37.

    Article  Google Scholar 

  16. Dai, W., Jin, H., Zou, D., et al. (2015). TEE: A virtual DRTM based execution environment for secure cloud-end computing[J]. Future Generation Computer Systems, 49, 47–57.

    Article  Google Scholar 

  17. Fan, Y., Liu, S., Tan, G., et al. (2020). Fine-grained access control based on trusted execution environment. Future Generation Computer Systems, 109, 551–561.

    Article  Google Scholar 

  18. Lim, S. H., Kim, D. J., Hur, Y., et al. (2019). An empirical study of the impacts of perceived security and knowledge on continuous intention to use mobile fintech payment services. International Journal of Human-Computer Interaction, 35(10), 886–898.

    Article  Google Scholar 

  19. Isaac, J. T., & Sherali, Z. (2014). Secure mobile payment systems. IT Professional, 16(3), 36–43.

    Article  Google Scholar 

  20. Xu, Y. P., Ma, Z. F., Wang, Z. H., et al. (2016). Survey of security for Android smart terminal. Journal on Communications, 37(6), 169–184.

    Google Scholar 

  21. Mtaho, A. B. (2015). Improving mobile money security with two-factor authentication. International Journal of Computer Applications, 109(7).

  22. Alimohammadirokni, M., Emadlou, A., & Yuan, J. J. (2021). The strategic resources of a gastronomy creative city: The case of San Antonio, Texas. Journal of Gastronomy and Tourism, 5(4), 237–252.

    Article  Google Scholar 

  23. Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel. I., & Reich, C. (2015). The current use of authentication technologies: an investigative review. In 2015 International Conference on Cloud Computing (ICCC) (pp. 1–8). IEEE.

  24. Johari, N. M., Nohuddin, P. N. E., Baharin, A. H. A., et al. (2022). Features requirement elicitation process for designing a chatbot application. IET Networks. https://doi.org/10.1049/ntw2.12071

    Article  Google Scholar 

  25. Tirandazi, P., Rahiminasab, A., & Ebadi, M. J. (2022). An efficient coverage and connectivity algorithm based on mobile robots for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-021-03597-9

    Article  Google Scholar 

  26. Rahiminasab, A., Tirandazi, P., Ebadi, M. J., et al. (2020). An energy-aware method for selecting cluster heads in wireless sensor networks. Applied Sciences, 10(21), 7886.

    Article  Google Scholar 

  27. Innovative Computing. (2022). Springer Science and Business Media LLC.

Download references

Funding

There is no specific funding to support this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pengnian Zhang.

Ethics declarations

Conflict of interest

The authors declared that they have no conflicts of interest regarding this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, P., Xu, L. Design and implementation of mobile e-commerce application built on WAP mobile payment system. Wireless Netw 30, 6089–6104 (2024). https://doi.org/10.1007/s11276-023-03409-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-023-03409-2

Keywords

Navigation