Design and Simulation of Mobile Commerce Identity Authentication Protocol Based on OTP

نویسندگان

  • Qin Wang
  • Huifeng Li
چکیده

With popularization and development of mobile commerce, the security of mobile commerce has drawn more and more attentions. Identity authentication is the first safety barrier, as communication security almost starts from its handshake process. Authentication protocol based on ciper technology is the safest method to realize identity authentication, and therefore identity authentication protocol is necessary to ensure communication security in mobile commerce. Combined One-time password (OTP) with Elliptic Curve Cryptosystem (ECC), a mobile commerce identity authentication (MCIA) protocol is presented. The two procedures of user registration and bidirectional authentication are designed. In order to verify its operation efficiency in the actual network environment, the simulation model of MCIA is set up through Opnet. The MCIA performance is analyzed from the statistics variables, including scheme time, server queuing delay, channel utilization and throughput. The results verify that MCIA has better feasibility in mobile commerce environment. Design and Simulation of Mobile Commerce Identity Authentication Protocol Based on OTP

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

M-Identity and Its Authentication Protocol for Secure Mobile Commerce Applications

Mobile commerce (m-commerce) delivers value-added services to existing customers and creates new market opportunities. However, establishing a secure m-commerce platform that offers high level of service can be challenging. This paper proposes a biometric-based digital identity authentication (BDIA) protocol targeted at m-commerce applications. In the BDIA protocol, m-identity includes both use...

متن کامل

A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users

Protection of sensitive information is a growing concern worldwide. Failure to protect sensitive information can lead to loss of clients in the banking sector or threaten national security. Access to sensitive information starts with e-authentication. Most authentication systems are designed for authenticated users only. However, the user is not the only party that needs to be authenticated to ...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Mobile Payment Protocol 3D by Using Cloud Messaging

The popularity of mobile platforms makes them a good candidate for electronic payment. However, there are challenges in this field such as privacy protection, security, the bandwidth limitations of mobile networks, and the limited capabilities of mobile devices. Traditional e-commerce payment protocols were designed to keep track of traditional flows of data, are vulnerable to attacks and are n...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJABIM

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2015