The increasing development of wireless networks and the widespread popularity of handheld devices such as Personal Digital Assistants (PDAs), mobile phones and wireless tablets represents an incredible opportunity to enable mobile devices as a universal payment method, involving daily financial transactions. Unfortunately, some issues hampering the widespread acceptance of mobile payment such as accountability properties, privacy protection, limitation of wireless network and mobile device. Recently, many public-key cryptography based mobile payment protocol have been proposed. However, limited capabilities of mobile devices and wireless networks make these protocols are unsuitable for mobile network. Moreover, these protocols were designed to preserve traditional flow of payment data, which is vulnerable to attack and increase the user-s risk. In this paper, we propose a private mobile payment protocol which based on client centric model and by employing symmetric key operations. The proposed mobile payment protocol not only minimizes the computational operations and communication passes between the engaging parties, but also achieves a completely privacy protection for the payer. The future work will concentrate on improving the verification solution to support mobile user authentication and authorization for mobile payment transactions., {"references":["Abad-Peiro J. L., Asokan N., Steiner M. & Waidner M, \"Designing a\ngeneric payment service\", IBM System Research Journal, Vol.37(1),\n1998, Pp. 72-88.","Bellare, M., Garay, J., Hauser, R., Herzberg, A., Steiner, M., Tsudik, G.,\nVan Herreweghen, E., and Waidner, M, \"Design,Implementation, and\nDeployment of the iKP Secure Electronic Payment system\", IEEE\nJournal of Selected Areas in Communications, 2000, pp. 611-627.","C. Wang & H-f. Leung, \"A Private and Efficient Mobile Payment\nProtocol\", London: Springer-Verlag, LNAI, 2005, pp.1030-1035.","http://www.setco.org/set_specifications.html","Jun Liu, Jianxin Liao, Xiaomin Zhu, \"A System Model and Protocol for\nMobile Payment\", Proceedings of the IEEE International Conference on\ne-Business Engineering (ICEBE-05), 2005.","Krueger, M, The future of M-Payments-business options and policy\nissues, Seville. Spain, 2001.","Kungpisdan, S., Srinivasan, B., and Phu Dung, L, \"Lightweight Mobile\nCredit-Card Payment Protocol\", Berlin Heidelberg: Springer -Verlag,\n2003a, pp. 295-308.","Kungpisdan, S., Srinivasan, B., and Phu Dung, L., \"A Practical\nFramework for MobileSET Payment\", Proceedings of International ESociety\nConference, 2003b, pp. 321-328.","Kungpisdan S., Srinivasan B., and Phu Dung Le, \"A Secure Accountbased\nMobile Payment Protocol\", Proceedings of the International\nConference on Information Technology: Coding and Computing, Vol. 1,\nLas Vegas, USA, 2004a, pp. 35-39.\n[10] M. Ding and C. Unnithan, Mobile Payments (mPayments) -An\nExploratory Study of Emerging Issues and Future Trends, Deakin\nUniversity, 2002.\n[11] Mohony D.O., Peirce M. and Tewari Histesh, Electronic Payment\nSystems for E-Commerce, Artech House, United States of America,\n2001.\n[12] Panko R. R, Corporate Computer and Network Security, Prentice Hall,\nUpper Saddle River, New Jersey, 2004.\n[13] Pousttchi, K, \"Conditions for Acceptance and Usage of Mobile Payment\nProcedures\", Proceedings of the M-Business Conference, 2003.\n[14] Tellez J. & Sierra J, \"Anonymous Payment in a Client Centric Model for\nDigital Ecosystem\", IEEE DEST, 2007, pp. 422-427.\n[15] Tiwari, A., Sanyal, S., Abraham, A., Knapskog, J. S. & Sanyal, S., \"A\nMulti-factor Security Protocol for Wireless Payment-Secure Web\nAuthentication Using Mobile Devices\", IADIS International Conference\nApplied Computing, pp.160-167, 2007."]}