This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
On the Reliability of Electronic Payment Systems
May 1996 (vol. 22 no. 5)
pp. 294-301

Abstract—One of the problems facing the builders of the 'Information Superhighway' is how to charge for services. The high costs of billing systems suggest that prepayment mechanisms could play a large part in the solution. Yet how does one go about making an electronic prepayment system (or indeed any kind of payment system) robust? We describe some recent systems engineering experience which may be relevant_the successful introduction of cryptology to protect prepayment electricity meters from token fraud. These meters are used by a number of utilities from Scotland to South Africa, and they present some interesting reliability challenges.

[1] R. Anderson, "Why Cryptosystems Fail," Proc. ACM 1st Conf. Computer and Comm. Security, ACM Press, New York, 1993.
[2] R.J. Anderson, "UEPS-A Second Generation Electronic Wallet," Computer Security-ESORICS 92, Springer Lecture Notes in Computer Science, vol. 648, pp 411-418, 1992
[3] R.J. Anderson, "Why Cryptosystems Fail," Comm. ACM, Nov. 1994, pp. 32-40.
[4] R.J. Anderson, "Liability and Computer Security-Nine Principles," Proc. ESORICS 94, Springer Lecture Notes in Computer Science, vol. 875, pp. 231-245, 1994
[5] K. Appel and W. Haken, "The Solution to the Four Color Problem," Scientific American, vol. 27, no. 4, pp. 108-121, 1977.
[6] H. Rijpkema and M. Girard, “Computer Animation of Knowledge-Based Human Grasping,” Computer Graphics, Vol. 25, No. 4, July 1991, pp. 339-347.
[7] S.J. Bezuidenhout, "Serving the Needs of Newly Electrified Customers with the Latest in Electricity Sales Systems-the Retail Business," 53rd AMEU Convention, Durban, Oct. 1993.
[8] S.J. Bezuidenhoudt, "20 Questions and Answers About EDs," Eskom document sjb94/07/01, 1995.
[9] S.J. Bezuidenhoudt, "Card Use in Electricity Payment," Proc. Second Plastic Cards Conf.,Johannesburg, Nov. 1993.
[10] M. Burrows, M. Abadi, and R.M. Needham, "A Logic of Authentication," Proc. Royal Society of London A, vol. 426, pp 233-271, 1989.
[11] I. Ben-Aroya and E. Biham, "Differential Cryptanalysis of Lucifer," Technical Report no 753, Technion, Haifa.
[12] S.J. Bezuidenhoudt and P.A. Johnson, "Towards the Standardization of Electricity Sales&Dispensing Systems in South Africa," Proc. SAIEE Electricity Tariffs and Metering (ETAM), Mar. 1992.
[13] D. Chaum, "Encrypted IDs for Digital Privacy," Scientific American, vol. 267, no. 2, pp 76-81, Aug. 1992.
[14] H. Feistel, "Cryptography and Data Security," Scientific American, vol. 228, no. 5, pp. 15-23, May 1973.
[15] D. Kahn, The Codebreakers'.Macmillan, 1967.
[16] G.J. Kuhn, "The Use of Secret-key Techniques in Forward Information Verification," Proc. South African COMSIG, pp. 165-168, IEEE, 1992.
[17] P. Maes, "Gemplus," invited talk at Cardis 94, Lille, France, 1994
[18] E. McCullagh and I. Ryan, "Who Pays the Bills?" Cards Int'l, no. 108, pp. 8-11, Apr. 1994.
[19] J.K. MacKie-Mason and H.R. Varian, "Some FAQ's About Usage-Based Pricing," Nov.4, 1994. online athttp://gopher.econ.lsa.umich.edu.
[20] National Bureau of Standards, "Data Encryption Standard," FIPS Publication no. 46, Jan. 1977.
[21] M.J.A. Partridge, "Prepayment Coin Meters_A Target for Burglary," UK Home Office Crime Prevention Report no. 6, 1986.
[22] M.W. Pickering, "Customer Acceptance of Prepaid Metering Systems," Proc. SAIEE Electricity Tariffs and Metering (ETAM) Mar. 1992.
[23] R.H. Price, "STS Numeric Token Field Research," 1993.
[24] South African Bureau of Standards, "Standard Specification_Single-Phase Electricity Dispensing Systems Part 1: Electricity Dispensers," SABS 1524-1, 1994.
[25] Standard Transfer System, Eskom 1994.

Index Terms:
Reliability, cryptography, prepayment, metering, robustness, fraud, security, credit control, key management, revocation, robustness.
Citation:
Ross J. Anderson, S. Johann Bezuidenhoudt, "On the Reliability of Electronic Payment Systems," IEEE Transactions on Software Engineering, vol. 22, no. 5, pp. 294-301, May 1996, doi:10.1109/32.502222
Usage of this product signifies your acceptance of the Terms of Use.