A Secure Mobile Payment Framework in MANET Environment

被引:0
作者
Ahamad, Shaik Shakeel [1 ,2 ]
Sastry, V. N. [2 ]
Udgata, Siba K. [1 ]
机构
[1] Univ Hyderabad, Dept Comp & Informat Sci, Hyderabad, India
[2] Inst Dev & Res Banking Technol, Hyderabad, India
关键词
Automated Security Protocol Analysis (AVISPA) and Scyther Tool; Burrows-Albadi-Needham (BAN) Logic; Digital Signature with Message Recovery (DSMR) based on Elliptic Curve Cryptography (ECC); Mobile Agent; Multi-Hop Cellular-Networks; Public Key Infrastructure (PKI) Cryptosystems;
D O I
10.4018/jebr.2013010104
中图分类号
F [经济];
学科分类号
02 ;
摘要
In this paper the authors propose a Secure Mobile Payment Framework in Multi hop Cellular Network environment (which is an integration of cellular networks and mobile ad hoc networks) using Mobile Agent technology and Digital Signature with Message Recovery (DSMR) mechanism based on ECDSA mechanism. Secure communication in Multi hop Cellular Networks is a nontrivial task because of lack of infrastructure, no prior trust relationships among nodes due to the absence of a centralized authority. Mobile Agent technology and Digital Signature with Message Recovery based on ECDSA mechanism provides secure mobile payments in Multi hop Cellular Networks. Mobile Agent technology has many benefits such as bandwidth conservation, reduction of latency, reduction of completion time, Asynchronous (disconnected) communications. Digital Signature with Message Recovery based on ECDSA eliminates the need of adopting PM crypto systems. The proposed protocol ensures Authentication, Integrity, Confidentiality and Non Repudiation, achieves Identity protection from merchant and Eavesdropper; achieves Transaction privacy from Eavesdropper and Payment Gateway, achieves Payment Secrecy, Order Secrecy, forward secrecy, prevents Double Spending, Overspending and Money laundering. The security properties of the proposed protocol have been verified successfully using BAN Logic, AVISPA and Scyther Tools and presented with results.
引用
收藏
页码:54 / 84
页数:31
相关论文
共 19 条
[1]   AUTHENTICATION AND DELEGATION WITH SMART-CARDS [J].
ABADI, M ;
BURROWS, M ;
KAUFMAN, C ;
LAMPSON, B .
SCIENCE OF COMPUTER PROGRAMMING, 1993, 21 (02) :93-113
[2]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[3]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[4]   Digital signature with message recovery using self-certified public keys without trustworthy system authority [J].
Chang, YF ;
Chang, CC ;
Huang, HF .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 161 (01) :211-227
[5]  
Cremers C.J.F., 2006, SCYTHER SEMANTICS VE
[6]  
Isaac Jesus Tellez, 2007, 2007 Inaugural IEEE International Conference on Digital Ecosystems and Technologies, P422, DOI 10.1109/DEST.2007.372011
[7]   A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks [J].
Isaac, Jesus Tellez ;
Camara, Jose Sierra ;
Zeadally, Sherali ;
Torres Marquez, Joaquin .
COMPUTER COMMUNICATIONS, 2008, 31 (10) :2478-2484
[8]  
Isaac JT, 2007, LECT NOTES COMPUT SC, V4655, P1
[9]  
Kungpisdan S, 2003, LECT NOTES COMPUT SC, V2904, P295
[10]  
Menezes A., 1997, HDB APPL CRYPTOGRAPH