CFP last date
20 December 2024
Reseach Article

TSET: Token based Secure Electronic Transaction

by Rajdeep Borgohain, Moirangthem Tiken Singh, Moirangthem Tiken Singh, Sugata Sanyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Number 5
Year of Publication: 2012
Authors: Rajdeep Borgohain, Moirangthem Tiken Singh, Moirangthem Tiken Singh, Sugata Sanyal
10.5120/6773-9064

Rajdeep Borgohain, Moirangthem Tiken Singh, Moirangthem Tiken Singh, Sugata Sanyal . TSET: Token based Secure Electronic Transaction. International Journal of Computer Applications. 45, 5 ( May 2012), 1-6. DOI=10.5120/6773-9064

@article{ 10.5120/6773-9064,
author = { Rajdeep Borgohain, Moirangthem Tiken Singh, Moirangthem Tiken Singh, Sugata Sanyal },
title = { TSET: Token based Secure Electronic Transaction },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 45 },
number = { 5 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume45/number5/6773-9064/ },
doi = { 10.5120/6773-9064 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:36:47.590251+05:30
%A Rajdeep Borgohain
%A Moirangthem Tiken Singh
%A Moirangthem Tiken Singh
%A Sugata Sanyal
%T TSET: Token based Secure Electronic Transaction
%J International Journal of Computer Applications
%@ 0975-8887
%V 45
%N 5
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security and trust are the most important factors in online transaction, this paper introduces TSET, a Token based Secure Electronic Transaction, which is an improvement over the existing SET, Secure Electronic Transaction protocol. We take the concept of tokens in the TSET protocol to provide end to end security. It also provides trust evaluation mechanism so that trustworthiness of the merchants can be known by customers before being involved in the transaction. Moreover, we also propose a grading mechanism so that quality of service in the transactions improves.

References
  1. Boping, Z and Shiyu, S. : "An Improved SET Protocol", Proceedings of the 2009 International Symposium on Information Processing (ISIP'09),Huangshan, P. R. China, 2009, pp. 267-272.
  2. Ding, M. S and Unnithan, C. R. , 2002, "Mobile PaymentsmPayments) –An Exploratory Study of Emerging Issues and Future Trends", Information Technology and Organizations Deakin University. [online] Available at http://www. idea-group. com, pp. 99-101. (Accessed 15 February, 2012)
  3. Pettey, C. "Gartner Says Worldwide Mobile connections Will Reach 5. 6 Billion in 2011 as Mobile Data Services Revenue Totals $314. 7 Billion", 2011, [online] Available at http://www. gartner. com/it/page. jsp (Accessed 21 February, 2012).
  4. Boudriga, N. , "Security of Mobile Communications", 2009, CRC Press, USA. ISBN 0849379415.
  5. Ren, X. Y. , Wei, L. L,Zhang, J. F andMa, X. , "The Improvement of SET Protocol based on Security Mobile Payment", Journal of Convergence Information Technology, Volume 6, Number 7, 2011, pp. 22-28.
  6. Tiwari, A. , Sanyal,S. , Abraham,A and Sanyal,S. , "A Multifactor Security Protocol For Wireless Payment-Secure Web Authentication using Mobile Devices", IADIS International Conference, Applied Computing 2007, Salamanca, Spain, 2007, pp. 160-167.
  7. Vasudevan, R. A. and Sanyal, S. , "A Novel Multipath Approach to Security in Mobile and Ad Hoc Networks (MANETs)", Proceedings of International Conference on Computers and Devices for Communication CODEC'04), Kolkata, India, 2004, pp. CAN_0412_CO_F_1 to CAN_0412_CO_F_4.
  8. Li, Y andWang, Y. , "Secure Electronic Transaction (SET protocol)",2001, [online] Available at http://www. people. dsv. su. se/~matei/courses/IK2001_SJE/li-wang_SET. pdf (Accessed 15 February, 2012).
  9. Hwang, J. J. , Yeh, T. C and Li, J. B. , "Securing on-line credit card payments without disclosing privacy information". Computer Standards and Interfaces, Volume 25, Number 2, 2003,pp. 119-129.
  10. VISAEU,3D SET, [online] at http://www. visaeu. com/virt ual_visa/merchants/3dset. html. (Accessed 25 January, 2011)
  11. Sanyal, S. , Tiwari, A andSanyal, S. , "A Multifactor Secure Authentication System for Wireless Payment" , Emergent Web Intelligence: Advanced Information Retrieval Book Series: Advanced Information and Knowledge Processing, First Edition, 2010, Chapter 13, pp. 341-369, XVI, Springer Verlag London Limited, 2010.
  12. Goyal,V. ,Kumar,V. , Singh, M. , Abraham, A andSanyal, S. "CompChall: Addressing Password Guessing Attacks", Information Assurance and Security Track (IAS'05),2005, IEEE International Conference on Information Technology: Coding and Computing (ITCC'05), USA. April 2005, pp. 739-744, IEEE Computer Society.
  13. Fun,T. S. , Beng,L. Y. ,Roslan, R and Habeeb, H. S. , "Privacy in New Mobile Payment Protocol", In Proceedings of World Academy of Science, Engineering and Technology, Vol. 30,2008, pp. 443-447.
  14. Yong, X. , Jindi, L. , "Electronic Payment System De-sign Based on SET and TTP", 2010 International Conference on E-Business and E-Government, Guangzhou, 7-9 May 2010, pp. 275-278.
  15. Daemen, J andRijmen, V. , "The Design of Rijndael: AES - The Advanced Encryption Standard. " Springer, 2002. ISBN 3-540-42580-2.
Index Terms

Computer Science
Information Sciences

Keywords

Secure Electronic Transaction Token Privacy End To End Security trusted Third Party