Vol. 6, No. 1, January 29, 2012
10.3837/tiis.2012.01.008,
Download Paper (Free):
Abstract
As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber_s legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Cite this article
[IEEE Style]
L. Hu, L. Chi, H. Li, W. Yuan, Y. Sun, J. Chu, "The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment," KSII Transactions on Internet and Information Systems, vol. 6, no. 1, pp. 131-146, 2012. DOI: 10.3837/tiis.2012.01.008.
[ACM Style]
Liang Hu, Ling Chi, Hong-tu Li, Wei Yuan, Yuyu Sun, and Jian-feng Chu. 2012. The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment. KSII Transactions on Internet and Information Systems, 6, 1, (2012), 131-146. DOI: 10.3837/tiis.2012.01.008.
[BibTeX Style]
@article{tiis:20056, title="The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment", author="Liang Hu and Ling Chi and Hong-tu Li and Wei Yuan and Yuyu Sun and Jian-feng Chu and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2012.01.008}, volume={6}, number={1}, year="2012", month={January}, pages={131-146}}