Micropayment proposal with formal verification using coloured Petri nets and performance analysis on the Android platform

  • Authors:
  • Andreu Pere Isern-Deyí;M. Magdalena Payeras-Capellí;Macií Mut-Puigserver;Josep-Lluis Ferrer-Gomila;Llorenç Huguet-Rotger

  • Affiliations:
  • Universitat de les Illes Balears, Cra. de Valldemossa, km 7.5. Palma de Mallorca, Illes Balears, Spain;Universitat de les Illes Balears, Cra. de Valldemossa, km 7.5. Palma de Mallorca, Illes Balears, Spain;Universitat de les Illes Balears, Cra. de Valldemossa, km 7.5. Palma de Mallorca, Illes Balears, Spain;Universitat de les Illes Balears, Cra. de Valldemossa, km 7.5. Palma de Mallorca, Illes Balears, Spain;Universitat de les Illes Balears, Cra. de Valldemossa, km 7.5. Palma de Mallorca, Illes Balears, Spain

  • Venue:
  • International Journal of Business Intelligence and Data Mining
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Payments involving small amounts of money are usual in the online purchases of low-value services, goods or pieces of information. In these kinds of payments, called micropayments, a trade-off between efficiency and security requirements has to be provided. In a previous work, we presented an efficient and secure micropayment scheme which fulfils both the security properties that guarantee no financial risks and the desired privacy for customers. In order to prove the viability of the proposal, we have proceeded in two directions. First we have formally verified the protocol using coloured Petri nets CPN. Secondly, once we are able to assure, from the results of the formal verification, that the proposal satisfies the claimed properties, we have successfully implemented the scheme on the Android platform. Using the developed implementation, we have evaluated its performance to prove that the proposal is viable using current mobile devices. Several tests validate that our scheme can execute very fast payments with our simple but secure spending protocol. With the presented formal verification and performance analysis we can assure that the protocol is ready to be used.