Abstract
With the development of science and technology and the popularization of e-commerce, the application of wireless network technology in the business field has gradually become a hot spot of academic research, which also brings us new topics and challenges. The secure payment system based on the improved TOTP algorithm proposed in this paper involves the WAP wireless secure payment theory and the application of mobile e-commerce. This paper first studies the WAP wireless network theory of mobile payment system, and proposes the WAP algorithm flow based on identity encryption. Then, the secure wireless execution environment of the WAP encryption payment algorithm is analyzed in depth. This paper discusses the security requirements of the WAP wireless network payment system. Based on the identity encryption algorithm, several practical algorithms are proposed, and a wireless network mobile payment model combining NTRU and ECC is constructed to improve the WAP algorithm. This paper proposes a WAP wireless network security payment system based on the improved TOTP algorithm, constructs its overall structure, and designs a core algorithm with strong adaptability, including the improved TOTP algorithm and risk assessment algorithm. Finally, the performance of the WAP e-commerce secure payment system is tested and analyzed. The research found that when the 256-bit key was used to encrypt the login information, the number of tests was 23,588, the number of concurrent threads was 200, the number of requests per second was 518, the average response time was 0.219 s, the average traffic was 500 KB/s, and the error rate was 2%. It can be seen from the data that the WAP wireless secure payment system operates normally with low network delay and can respond to operation requests quickly under the condition of concurrent access by multiple users, with strong overall pressure resistance. The work of this paper has a good reference value for the construction of the WAP wireless network payment system and the design and application of mobile e-commerce, which is conducive to further research.
Similar content being viewed by others
Data availability
The experimental data used to support the findings of this study are available from the corresponding author upon request.
References
Jiang, M. (2017). WAP based mobile e-commerce security scheme. Computer Knowledge and Technology, 2.
Waqas, M., Tu, S., Halim, Z., et al. (2022). The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges. Artificial Intelligence Review, 55(7), 5215–5261.
Ramana, S., Ramu, S. C., Bhaskar, N., Murthy, M. R., & Reddy, C. R. A three-level gateway protocol for secure m-commerce transactions using encrypted OTP. In 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC) (pp. 1408–1416). IEEE.
Xiao, Z. (2009). Overview of mobile internet research. Telecommunications Science, 25(10), 30–36.
Bojjagani, S., Rao, P. V. V., Vemula, D. R., et al. (2022). A secure IoT-based micro-payment protocol for wearable devices. Peer-to-Peer Networking and Applications, 15(2), 1163–1188.
Abolfathi, M., Shomorony, I., Vahid, A., & Jafarian, J. H. (2022). A game-theoretically optimal defense paradigm against traffic analysis attacks using multipath routing and deception. In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies (67–78).
Cai, T., Chen, W., Psannis, K. E., et al. (2022). Scalable on-chain and off-chain blockchain for sharing economy in large-scale wireless networks. IEEE Wireless Communications, 29(3), 32–38.
Yue, Z. (2007). Research on mobile payment operation mode and market diffusion. China New Communications, 9(22), 77–78.
Bhutta, M. N. M., Bhattia, S., Alojail, M. A., et al. (2022). Towards secure IoT-based payments by extension of payment card industry data security standard (PCI DSS). Wireless Communications and Mobile Computing, 2022, 1–10.
Abdullah, K. (2010). Comparison between the RSA cryptosystem and elliptic curve cryptography. The University of Waikato.
Ray, S., Biswas, G. P., & Dasgupta, M. (2016). Secure multi-purpose mobile-banking using elliptic curve cryptography. Wireless Personal Communications, 90(3), 1331–1354.
Hu, J., Weng, X., Yang, L., Lei, S., & Niu, H. (2022). Centrifugal modeling test on failure characteristics of soil-rock mixture slope under rainfall. Engineering Failure Analysis, 142, 106775.
Jana, B., & Poray, J. A performance analysis on elliptic curve cryptography in network security. In 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE) (pp. 1–7). IEEE.
Singh, S. R., Khan, A. K., & Singh, S. R. Performance evaluation of RSA and elliptic curve cryptography. In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) (pp. 302–306). IEEE.
Ekberg, J. E., Kostiainen, K., & Asokan, N. (2014). The untapped potential of trusted execution environments on mobile devices. IEEE Security & Privacy, 12(4), 29–37.
Dai, W., Jin, H., Zou, D., et al. (2015). TEE: A virtual DRTM based execution environment for secure cloud-end computing[J]. Future Generation Computer Systems, 49, 47–57.
Fan, Y., Liu, S., Tan, G., et al. (2020). Fine-grained access control based on trusted execution environment. Future Generation Computer Systems, 109, 551–561.
Lim, S. H., Kim, D. J., Hur, Y., et al. (2019). An empirical study of the impacts of perceived security and knowledge on continuous intention to use mobile fintech payment services. International Journal of Human-Computer Interaction, 35(10), 886–898.
Isaac, J. T., & Sherali, Z. (2014). Secure mobile payment systems. IT Professional, 16(3), 36–43.
Xu, Y. P., Ma, Z. F., Wang, Z. H., et al. (2016). Survey of security for Android smart terminal. Journal on Communications, 37(6), 169–184.
Mtaho, A. B. (2015). Improving mobile money security with two-factor authentication. International Journal of Computer Applications, 109(7).
Alimohammadirokni, M., Emadlou, A., & Yuan, J. J. (2021). The strategic resources of a gastronomy creative city: The case of San Antonio, Texas. Journal of Gastronomy and Tourism, 5(4), 237–252.
Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel. I., & Reich, C. (2015). The current use of authentication technologies: an investigative review. In 2015 International Conference on Cloud Computing (ICCC) (pp. 1–8). IEEE.
Johari, N. M., Nohuddin, P. N. E., Baharin, A. H. A., et al. (2022). Features requirement elicitation process for designing a chatbot application. IET Networks. https://doi.org/10.1049/ntw2.12071
Tirandazi, P., Rahiminasab, A., & Ebadi, M. J. (2022). An efficient coverage and connectivity algorithm based on mobile robots for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-021-03597-9
Rahiminasab, A., Tirandazi, P., Ebadi, M. J., et al. (2020). An energy-aware method for selecting cluster heads in wireless sensor networks. Applied Sciences, 10(21), 7886.
Innovative Computing. (2022). Springer Science and Business Media LLC.
Funding
There is no specific funding to support this research.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declared that they have no conflicts of interest regarding this work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhang, P., Xu, L. Design and implementation of mobile e-commerce application built on WAP mobile payment system. Wireless Netw 30, 6089–6104 (2024). https://doi.org/10.1007/s11276-023-03409-2
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-023-03409-2