Font Size: a A A

Research On Security Of Mobile Commerce

Posted on:2011-12-29Degree:DoctorType:Dissertation
Country:ChinaCandidate:W FanFull Text:PDF
GTID:1118360308961406Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
With the development of mobile Internet technology and the increasing demand for e-commerce, mobile commerce (m-commerce), as an emerging branch of e-commerce, attracts more and more attention. As it is not restricted by space, and also convenient to transfer anytime, anywhere, m-commerce was being developed rapidly and has been widely used in many countries. From the long term prospect, m-commerce has to solve its bottlenecks in order to get a greater development in the future. The security problem is one of the most important factors that affect its adoption.For the security issues of mobile commerce, this dissertation mainly focuses on two aspects. On the one hand, from the aspect of security in the process of transaction, two fair mobile payment protocols and two fair electronic contract signing protocols are proposed, which can assure that each party of the transaction can get their products, money, and the signed electronic contract. As a result, the security and fairness is ensured by the proposed protocols.On the other hand, from the aspect of security of participants'authentication, a secure mobile IP registration scheme is proposed by studying the mobile IP registration protocol. It can authenticate the participant's identity securely.1. Aiming at two different scenarios, two fair mobile payment protocols are designed for digital products transaction. They can protect the interests of both participants under the premise of protection to the transaction's security, and meet the requirement of fairness, security and non-repudiation. The most prominent character of the proposed protocols is that there is no conventional third party involved in the transaction. The payment process is simplified by using the concurrent signature, so that the transaction "bottleneck" problem caused by the third party has been avoided. Protocol 1 can guarantee that after the merchant publishes the key, customers can get the decrypted products, and the electronic check becomes valid at the same time. The transaction process is simple and efficient, and the fairness can also be guaranteed by the protocol. This protocol is suitable for micropayment. Protocol 2 strengthens the protection of the customers' interests. Customers can get the decrypted product first and then publish keys in the transaction. They can also choose to quit the transaction if there is any possible cheat.2. The electronic contract signing protocols for two parts and multiple parts (e.g., triple parts) are proposed respectively. Both of them can guarantee the fairness among participants. The equality of each party is fully considered, and there is no third-party involving in the signature exchange process. Each participant can get the signed contracts after the exchange process by the protocol.3. By using a combination of ID-based signature scheme and symmetric cryptography, a secure mobile IP registration protocol is proposed. It can protect the confidentiality of user's identity and location. Moreover, there is no pairing calculation in this protocol, so that the computation complexity and registration delay are reduced.
Keywords/Search Tags:Mobile commerce, Mobile commerce security, Mobile payment protocol, Electronic contract signing, Mobile IP registration
PDF Full Text Request
Related items