Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce

نویسندگان

  • Yong Lee
  • Jaeil Lee
  • JooSeok Song
چکیده

With the advent of wireless communication and internet protocol, many technologies have been developed to provide mobile phone user with the wireless internet service. Security supporting wireless internet must be guaranteed at same level as the wired security. But PKI (Public Key Infrastructure) which is used for the security of e-commerce in wired internet is not suitable for the mobile phone because of the fundamental limitation of performance such as less memory and less powerful CPU. Therefore, we need to develop a wireless PKI (WPKI) that provides the similar security level as the wired PKI supporting mobile phone. In this paper, we consider why it is difficult to apply the wired PKI technology to the mobile phone and how to cope with these problems. We propose wireless PKI technology and illustrate that implementation result of the proposed wireless PKI technology on the newest mobile phone. We minimize data sizes processed in mobile phone, and optimize protocols for the certificate management and verification between mobile phone and server. This results in the reduced module sizes to be able to install in mobile phone. Hence, the proposed WPKI technology shows that security is in the same level as the wired PKI and all PKI procedures are successfully processed in mobile phone. 2006 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure M-Commerce with WPKI

The huge success of mobile telephone is about to transform ebusiness and the Internet. As a Personal Trusted Device PTD, the mobile phone, will be able to handle secure transactions in a wireless world. The Wireless Application Protocol (WAP) suite enables secure e-commerce services and applications. This paper present an overview of the PKI and the WAP environments and their relation to the In...

متن کامل

Wireless Public key Infrastructure for Mobile Phones

Mobile devices play an important role in the wireless network environment for providing different services over internet. The business transactions over wireless electronic devices are not secure and hence the messages are prone to be intercepted and modified by an intruder. So, devices supporting wireless internet must be guaranteed at the same level of security as the wired network. PKI (Publ...

متن کامل

کسب و کار الکترونیکی در حوزه سلامت

Background and Aim: The use of electronic operations in health care industry has many positive points such as health care quality improvement, reduction in costs, and increased efficiency. Besides talking about the concept of Mobile Commerce (M-Commerce) as well as its benefits and challenges, the present article presents suitable approaches to benefit more from this new technology in the field...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

Exploring Factors Associated with Wireless Internet via Mobile Technology Acceptance in Mainland China

This study explores factors significantly impact the acceptance of Wireless Internet via Mobile Technology (WIMT) in China. The results indicate that the acceptance of WIMT is related with factors of: perceived usefulness, perceived ease of use, social influences, wireless trust environment, and facilitating conditions. It provides diagnostic insight into how different factors influence user in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Communications

دوره 30  شماره 

صفحات  -

تاریخ انتشار 2007