DESIGNING AND IMPLEMENTATION OF ELECTRONIC PAYMENT GATEWAY FOR DEVELOPING COUNTRIES 1 AILYA IZHAR, 2 AIHAB KHAN, 3 MALIK SIKANDAR HAYAT KHIYAL, 4 WAJEEH JAVED, 5 SHIRAZ BAIG 1 Graduate, Departent of Software Engineering, Fatia Jinnah Woen University, Rawalpindi, Pakistan 2 Assistant Professor, Departent of Software Engineering, Fatia Jinnah Woen University, Rawalpindi, Pakistan 3 Chairperson, Departent of Coputer Science and Software Engineering, Fatia Jinnah Woen University, Rawalpindi, Pakistan 4Assistant Manager, G & C. AERO. Pakistan 5 Departent of Coputer Science and Software Engineering, Fatia Jinnah Woen University, Rawalpindi, Pakistan ABSTRACT In this paper a brief overview of electronic payent gateway is provided. This paper addresses the requireents for an electronic payent gateway fro both the custoers' and the erchants' point of view. Most of the population doesn t trust on the local existing online payent gateway because it is not very secure. Mostly people want to adopt electronic payent syste as it has lots of advantages. They need such a gateway that fulfill their all requireents and provide security, privacy etc. On the basis of these requireents and the local infrastructure, we propose an electronic payent gateway for local environent. Keyword: E-Coerce, Electronic Payent Gateway. 1. INTRODUCTION Online shopping allows custoers to sit in their hoes and buy goods fro all over the world. Siilarly allows Merchant to sell their products to all over the world fro hoe. Most of the population will use online payent in near future. Most of the Third world countries lagged behind in aking a good Internet architecture. There is need of a secure online payent gateway in developing countries. On the basis of proposed architecture of e-payent syste of third world countries, this paper gives a brief overview of existing electronic payent gateway. It also entioned the requireent for an electronic payent gateway fro custoer and erchant s point of view. And on the basis of these facts and figures a new secure e-payent gateway has been designed and developed. The payent gateway would provide secure transactions. 2.CONTRIBUTIONS On the basis of proposed architecture of e- payent syste of third world countries and the requireents related to any electronic payent gateway, we design and develop a Secure, reliable and efficient electronic payent gateway. 3. RELATED WORK In USA about $3.5 trillion pours daily through three ajor payent networks that dwarf the Bank of New York's. The networks, run by banks and the governent over high-speed phone lines, converge at just 10 secret dataprocessing centers nationwide. They transit everything fro direct-deposit paychecks to utility bill payents to huge corporate transfers in the USA and abroad. PayPal in the US, which was recently purchased by Ebay, is one of the ost frequently used e-payent gateway. [1] In China payent gateway is the single biggest unet deand because of lack of trusted and secure echanis. [2] Turkey s payent gateway is difficult to use, insecure and highly expensive. 84
In Nepal there are around 3three banks that are offering Internet Banking Services and ajority of iddle class are out of such services. 4. PRELIMINARIES Online custoer: A custoer is an entity who will buy products by aking payents in tiely anner. Merchants: A erchant is a seller who will receive payents ade by custoer. Banks: Two banks are involved. 1. Client bank 2. Merchant bank Client bank: Client bank holds client s bank account and validate custoer during account registration. Merchant bank: Merchant bank holds erchant bank account. It is responsible of anageent, fraud control etc Payent Gateway: A payent gateway is connected to all custoers, erchants and banks through Internet and responsible for the speed and reliability and security of all transactions that take place. 5. FRAMEWORK OVERVIEW We proposed a odel of electronic payent gateway on the basis of requireents of an electronic payent gateway in developing countries. Figure no. 1: Proposed Model There are five interfaces. 1. Custoer Interface 2. Server (e-payent Gateway) Interface 3. Client Bank Interface 4. Merchant Bank Interface 5. Merchant Interface Online Custoer will connect to e-payent gateway through Internet. Gateway will connect to the Bank and check whether its bank accounts is enough to buy the required product. Online custoer can also visit Merchant s website through Gateway. 6. FLOW DIAGRAM: Flow diagra of proposed gateway is given below. 85
Confiration: When transaction took place custoer ust have notification and erchant ust have confiration Confidentiality: Any third parties should not be able to access or view such payents. Settleent: Separate banking institutions ust have a way of settling their accounts. Following diagra will explain working of electronic payent gateway in detail. Client Place 1.1 1.2 Validate Data Encrypt Data 1.3 Send Data 2.1 Decrypt Data Server 2.2 Split Data 2.3 Encrypt Data 2.4 Send Data 6.0 Client Mail Custoer Data Order Client Bank Merchant 3.3 Split Data 3.2 Decrypt Data 3.1 Receive Data 4.1 Receive Data 5.0 Mail Figure no. 2: Flow diagra of proposed gateway Order Info 3.4 Send Data Merchant Bank 4.2 Decrypt Data 7. TECHNIQUES AND ALGORITHM: 4.3 Split Data Privacy: It is necessary to assure privacy in the payents like bank accounts. Naing: There should be a way of identifying the custoers bank accounts and the erchant bank accounts. Security: In gateways security should provide to protect data of transactions. Integrity: Data should be difficult to change. Save Ites Figure no. 3: Detailed odel If new user wants to do transaction then he/she should register hiself/herself first through registration for then browse erchant website using e-payent gateway. Select ite and encrypt payent request and send it to Server. Server receives encrypted essage fro sender, decrypt essage, read, encrypt it using its own keys and send it to Client bank. Client bank transfers the required aount to the erchant bank through secure network. After receiving the fund Merchant bank sends the payent capture response to erchant through e-payent gateway. 86
Algorith of Client: Client: Start and connect Start Custoer browse erchant website If select Category then Go to Ite list of selected category If Select Ite Then Show detail of selected ite If Want to buy selected ite Then select Add to order for Else Go back to category If select add to order for Do AddToOrder SubCategoryId go to Order for and fill required fields like credit card No., expiry Date, and telephone no, Address Select Subit Else Continue shopping Else Cancel If select subit Display Authorization If Credit card no.text is equal to Credit card no. display This Custoer is Authorized Fro Bank. Figure no. 4: Algorith of client Client can browse erchant s website. After selection of ites he can send payent order to e-payent server after filling required fields e.g Credit card no., expiry date etc Algorith of Payent gateway Payent gateway: Receive payent essage Else display Not Connected If receive payent essage {Decrypt essage Split and send it to different textboxes Add to database Sent it to Client bank} Else Cancel If client bank is sending essage {Receive it Send it to erchant bank} Else wait If erchant bank is sending essage {Receive it Send it to Merchant} else wait Server receives payent order sent by clients, decrypt and encrypt that essage and send it to Client bank. Client bank will send a payent deduction essage to server and server will send it to Merchant Bank. Merchant bank will send an acknowledgent essage to Server and server will send it to erchant. Algorith of Client Bank Client Bank: Receive payent essage including client s info If client s info is present in database of bank Send essage to server This custoer is Authorized Else Send essage This custoer is not Authorized If custoer is Authorized {Save payent request into database Deduct aount fro Client bank Send that aount to Payent Gateway} Figure no. 6: Algorith of Client bank Client bank receives payent essage and verify client. Deduct aount fro client bank and send that aount to payent gateway. Algorith of Merchant Bank Merchant Bank Receive payent essage including erchant account no. If erchant s account is present in database of bank {Receive payent Add payent to Merchant s account} Else Send essage Invalid account no. Figure no. 7: Algorith of Merchant bank Merchant bank verifies erchant, receives payent essage fro Client bank through payent server and add payent to Merchant s account. Figure no. 5: Algorith of payent gateway 87
Algorith of Merchant Merchant {Make and update website If server is sending essage Receive essage and decrypt it} Else retry to connect Figure no. 8: Algorith of Merchant Merchant akes and updates website and receives acknowledgeent essages fro payent gateway. 8. EXPERIMENTAL RESULTS: 1. Graphical result of survey A survey was carried out of various users in three different areas for finding the reason that why people don t use payent gateway and wrote it by copiling the average results of entioned questions. 90 80 70 60 50 40 30 20 10 0 User friendlyknowledge Trust Need PC and internet availability Figure no 9: Graphical result of survey a. User Friendly: People wants a payent gateway which should be easy to use. b. Knowledge: Soe people don t know anything about payent gateway. c. Trust: Mostly people don t use it because of lack of trust. d. Need: Soe people thinks there is no need of e-payent gateway. e. PC and Internet availability: Liited access of PC and internet. 2. Graphical result of proposed gateway Graphical result of proposed gateway is following 1st area 2nd area 3rd area 100 80 60 40 20 0 Figure no.10: Graphical result of proposed gateway User Friendly Cost Security Perforance Reliability Speed As copare to other e-payent gateways our proposed syste will be ore secure and do transactions in less tie as copare to other gateway. Proposed syste will be inexpensive as copare to existing systes 3.Table of coparisons with various countries Tie Cost Availabi l-ity Securit y USA Low Mediu High High China Mediu Low Low Low Turkey High High Low Low Nepal High Mediu Low Low Africa Mediu High Low High Propose Low Low High High d Syste Figure no. 11: Table of coparision a. Tie: Tie of transaction b. Cost: E-gateway s charges per transaction c. Availability: The degree to which e- gateway is operable d. Security: Overall security related to electronic gateway 4. Coparison between TDES and other Techniques of encryption. DES (Data Encryption Standard) is a 56 bit key encryption standard. But it was probleatically short. Therefore, its iproved standard was developed, called Triple DES. It uses 168 independent key bits. That has been used in Proposed gateway. There is latest iproveent known as AES (Advanced Encryption Standard) 88
but it is very slow. So, Triple DES is considered to be ore secure and fast. Experients were carried out to copare DES, TDES and AES encryption standards. The results are as follows: Tie was copared for encryption. If there is large nuber of transactions, tie assues iportance. Tie in Milisec 500 400 300 200 100 0 56 bit DES 128 bit DES AES Encyption Standards Figure no. 12: Coparison of Encryption standards 9. CONCLUSION AND FUTURE WORK Electronic Payent Gateway is present in our country but it s not very secure. The proposed payent architecture was also lacking the security factor. That proposed architecture is ade secure by the ipleentation of secure electronic transaction ethods. Because of this now only authentic custoers can now buy products fro erchant s site whose bank accounts is enough to buy the required product. At first it s checked if the custoer is authorized one or not then the whole transaction takes place. The electronic payent gateway is ade secure enough that any authorized custoer can easily trust on it and fearlessly or confidently ake payents over the Internet. If this syste is to be ipleented in developing countries then strong support of governent of that country is required as there is not uch awareness of electronic transaction in developing countries. REFERENCES [1]http://www.usatoday.co/tech/news/2001/10/ 29/financial-networks-safety.ht accessed on 09 Dec 2010 (DATE) [2]http://iisdb.stanford.edu/docs/189/epayent_bin_tan g.pdf accessed on 09 Dec 2010 [3] Rosenberg, J., Schulzrinne, H., Caarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E. 2002. SIP: Session Initiation Protocol. RFC 3261 (June). [4] Aboba, B., Arkko, J., Harrington, D. 2000. Introduction to accounting anageent. RFC 2975 (October). [5] M. M. Anderson:, Electronic check architecture, Tech. Rep. Version 1.0.2, FSTC, Septeber 1998. [6] Knud Böhle, Michael Rader, Ulrich Rieh Institut für Technikfolgenabschätzung und Systeanalyse: Electronic Payent Systes in European Countries Country 1999 [7] Steran, B., Sadolevsky, D., Schwartz, D., Willias, D., Beck, W. 2006. RADIUS extension for digest authentication. RFC 4590 (July). [8] Hakala, H., Mattila, L., Koskinen, J-P., Stura, M., Loughney, J. 2005. Diaeter creditcontrol application. RFC 4006 (August). [9] Süleyan Kondakci: An Approach to A National E-Payent Architecture IT Consortiu of Turkey,Division of Inforation Security, 2002 [10] Vivek S. rana, Chief IT/MTS Nepal Banks Liited: Banking and e payent practices in Nepal Deceber 2004 [11] Rajib Subba: e-payent for SME Exporters: Payent for SME Exporters: Drivers and Barriers Regional Business Foru on e-finance Bangkok, Thailand, 6-7 March 2006 [12] Wondwossen Tadesse, Tsegaye G/Medhin, Soloon Atnafu, Dawit Bekele: e-payent in Ethiopia: Challenges and Opportunities Foru on ICTs, Trade and Econoic Growth. March 14 16, 2006 [13] Jennings, C., Fischl, J., Tschofenig, H., Jun, G. 2006. Payent for services in Session Initiation Protocol (SIP). draft-jenningssipping-pay-05.txt (October). 89
[14] Garcia-Martin, M., Belinchon, M., Pallares- Lopez, M., Canales-Valenzuela, C., Tai, K. 2006. Diaeter Session Initiation Protocol (SIP) Application. RFC 4740 (Noveber) [15] Lior, A., Yegani, P., Chowdhury, K., Tschofenig, H., Pashalidis, A. 2006. Prepaid extensions to reote authentication dial-in user service (RADIUS), draft-lior-radiusprepaid-extensions-11.txt (work in progress, June). [16] Book cryptography and network security: Principles and practice by Willia stalling 3 rd edition, vol: 7, August 2004 90