Font Size: a A A

Research Of Identity Authentication Based On Context Aware In Mobile Commerce Environment

Posted on:2016-03-08Degree:MasterType:Thesis
Country:ChinaCandidate:X H QiangFull Text:PDF
GTID:2428330464461096Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the popularity of the mobile intelligent terminal and the development of the wireless communication network,mobile e-commerce is playing an increasingly important role in people's life,work and study.The development of mobile e-commerce brings convenience to people's life;however,it also faces a variety of security threats.In addition,as the first line of defense in system security,identity authentication technology is an important foundation for mobile e-commerce security.Currently,the potential drawbacks exist in the authentication technology,such as insufficient security,unsuitable for the mobile environment,common user experience and other issues.For these reasons,in order to guarantee mobile e-commerce's security,this thesis researches on mobile e-commerce's identity authentication based on context-awareness technology.First,this thesis introduces the identity authentication technology which is mainly applied in practical mobile e-commerce,analyzes and summarizes the advantages and disadvantages of the applied identity authentication technology with respect to security,applicability,user experience and the whole process's certification.Second,for the existing issues,an identity authentication scheme based on context-awareness in mobile e-commerce environment is proposed.The proposed scheme exploits context-aware technology as a security supplement on the basis of the existing mobile e-commerce authentication scheme.The scheme introduces context-awareness technology,collects the mobile user's current situation information from physical context and user's product information,constructs current user's situation and speculates user's behavior.Calculating the current user's confidence degree by the proposed algorithm based on normalization method and the Bayesian learning algorithm.At the same time,based on perfect Bayesian Nash equilibrium in game theory,the scheme determines the threshold of user's confidence degree in the proposed identity authentication scheme.According to the current user's confidence degree and threshold,the scheme determines the credibility of the current user.The scheme provides whole process's certification in mobile e-commerce environment,defenses the facing threats in applied authentication schemes' window period and improves the security,applicability and user experience of the previously proposed scheme.Third,this thesis puts forward an evaluation method for the mobile e-commerce identity authentication scheme.Then the evaluation indicators from the security,applicability,intelligence and other characteristics of mobile e-commerce identity authentication scheme are designed and the weight for every evaluation indicator is determined.Based on the fuzzy comprehensive evaluation method,the proposed scheme and scheme based on dynamic password are evaluated.The assessment describes the proposed identity authentication scheme based on context-awareness has a better authentication capability.Finally,a prototype system of the proposed identity authentication scheme applied in mobile e-commerce environment is implemented.The design and implement of each module of the prototype system is mainly introduced,including context data collection module,context data processing module,confidence calculation module and identity authentication service module.The running condition of the system demonstrates that the identity authentication scheme based on context-awareness in mobile e-commerce environment has a better performance in the aspects of security,applicability and intelligence.In addition,the characteristic of the mobile environment is fully considered.In conclusion,the scheme is more suitable for the requirements of identity authentication for the mobile e-commerce.
Keywords/Search Tags:mobile e-commerce, context awareness, identity authentication, security assessment, information security
PDF Full Text Request
Related items