Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

TSET: Token based Secure Electronic Transaction

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 45 - Number 5
Year of Publication: 2012
Authors:
Rajdeep Borgohain
Moirangthem Tiken Singh
Moirangthem Tiken Singh
Sugata Sanyal
10.5120/6773-9064

Rajdeep Borgohain, Moirangthem Tiken Singh, Moirangthem Tiken Singh and Sugata Sanyal. Article: TSET: Token based Secure Electronic Transaction. International Journal of Computer Applications 45(5):1-6, May 2012. Full text available. BibTeX

@article{key:article,
	author = {Rajdeep Borgohain and Moirangthem Tiken Singh and Moirangthem Tiken Singh and Sugata Sanyal},
	title = {Article: TSET: Token based Secure Electronic Transaction},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {45},
	number = {5},
	pages = {1-6},
	month = {May},
	note = {Full text available}
}

Abstract

Security and trust are the most important factors in online transaction, this paper introduces TSET, a Token based Secure Electronic Transaction, which is an improvement over the existing SET, Secure Electronic Transaction protocol. We take the concept of tokens in the TSET protocol to provide end to end security. It also provides trust evaluation mechanism so that trustworthiness of the merchants can be known by customers before being involved in the transaction. Moreover, we also propose a grading mechanism so that quality of service in the transactions improves.

References

  • Boping, Z and Shiyu, S. : "An Improved SET Protocol", Proceedings of the 2009 International Symposium on Information Processing (ISIP'09),Huangshan, P. R. China, 2009, pp. 267-272.
  • Ding, M. S and Unnithan, C. R. , 2002, "Mobile PaymentsmPayments) –An Exploratory Study of Emerging Issues and Future Trends", Information Technology and Organizations Deakin University. [online] Available at http://www. idea-group. com, pp. 99-101. (Accessed 15 February, 2012)
  • Pettey, C. "Gartner Says Worldwide Mobile connections Will Reach 5. 6 Billion in 2011 as Mobile Data Services Revenue Totals $314. 7 Billion", 2011, [online] Available at http://www. gartner. com/it/page. jsp (Accessed 21 February, 2012).
  • Boudriga, N. , "Security of Mobile Communications", 2009, CRC Press, USA. ISBN 0849379415.
  • Ren, X. Y. , Wei, L. L,Zhang, J. F andMa, X. , "The Improvement of SET Protocol based on Security Mobile Payment", Journal of Convergence Information Technology, Volume 6, Number 7, 2011, pp. 22-28.
  • Tiwari, A. , Sanyal,S. , Abraham,A and Sanyal,S. , "A Multifactor Security Protocol For Wireless Payment-Secure Web Authentication using Mobile Devices", IADIS International Conference, Applied Computing 2007, Salamanca, Spain, 2007, pp. 160-167.
  • Vasudevan, R. A. and Sanyal, S. , "A Novel Multipath Approach to Security in Mobile and Ad Hoc Networks (MANETs)", Proceedings of International Conference on Computers and Devices for Communication CODEC'04), Kolkata, India, 2004, pp. CAN_0412_CO_F_1 to CAN_0412_CO_F_4.
  • Li, Y andWang, Y. , "Secure Electronic Transaction (SET protocol)",2001, [online] Available at http://www. people. dsv. su. se/~matei/courses/IK2001_SJE/li-wang_SET. pdf (Accessed 15 February, 2012).
  • Hwang, J. J. , Yeh, T. C and Li, J. B. , "Securing on-line credit card payments without disclosing privacy information". Computer Standards and Interfaces, Volume 25, Number 2, 2003,pp. 119-129.
  • VISAEU,3D SET, [online] at http://www. visaeu. com/virt ual_visa/merchants/3dset. html. (Accessed 25 January, 2011)
  • Sanyal, S. , Tiwari, A andSanyal, S. , "A Multifactor Secure Authentication System for Wireless Payment" , Emergent Web Intelligence: Advanced Information Retrieval Book Series: Advanced Information and Knowledge Processing, First Edition, 2010, Chapter 13, pp. 341-369, XVI, Springer Verlag London Limited, 2010.
  • Goyal,V. ,Kumar,V. , Singh, M. , Abraham, A andSanyal, S. "CompChall: Addressing Password Guessing Attacks", Information Assurance and Security Track (IAS'05),2005, IEEE International Conference on Information Technology: Coding and Computing (ITCC'05), USA. April 2005, pp. 739-744, IEEE Computer Society.
  • Fun,T. S. , Beng,L. Y. ,Roslan, R and Habeeb, H. S. , "Privacy in New Mobile Payment Protocol", In Proceedings of World Academy of Science, Engineering and Technology, Vol. 30,2008, pp. 443-447.
  • Yong, X. , Jindi, L. , "Electronic Payment System De-sign Based on SET and TTP", 2010 International Conference on E-Business and E-Government, Guangzhou, 7-9 May 2010, pp. 275-278.
  • Daemen, J andRijmen, V. , "The Design of Rijndael: AES - The Advanced Encryption Standard. " Springer, 2002. ISBN 3-540-42580-2.