A SIM-based electronic transaction authentication system
نویسندگان
چکیده
This paper presents a SIM-based tool for user authentication in various service areas such as financial transactions in e-commerce. Other remote services can use SIM as an authentication tool over existing GSM technology through GPRS, which is an additional packet data feature for the GSM network. GPRS enables packet-switched traffic to exist in predominantly circuit-switched GSM infrastructure. As GPRS is designed to support packet based protocols, such as the Internet Protocol (IP) based burst and uneven traffic flow, it enables new services such as reasonably fast access to the Internet, electronic mail and other data oriented services. These services have been too inefficient in traditional circuit-switched digital mobile networks. Using GPRS features the e-commerce applications can use SIM for user authentication in transactions. SIM can also be a tool for user identity and authentication around the corporate intranets. This can reduce security infrastructure setup and investment overhead for the security concerned organizations. This paper presents an electronic payment protocol that uses SIM based authentication along with illustration of its formal modelling and verification results. The proposed authentication system offers more robust security features than other electronic transaction systems proposed to date.
منابع مشابه
Performance Evaluation of the Fast Authentication Schemes in GSM-WLAN Heterogeneous Networks
In GSM-WLAN heterogeneous networks, the authentication efficiency is one of the drawbacks for message transaction and processing in the RADIUS server. This paper proposed two fast authentication schemes, based on the EAP-SIM mechanism, to improve the authentication efficiency by balancing the message transaction loads and processing loads among the RADIUS server and individual APs. In this pape...
متن کاملA hybrid approach for database intrusion detection at transaction and inter-transaction levels
Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملAuthentication tests and disjoint encryption: A design method for security protocols
We describe a protocol design process, and illustrate its use by creating atspect, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design process is organized around the authentication tests, a method for protocol verification based on the strand space theory. The authentication tests dictate how randomly generated values such as nonces may be combined wit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Comput. Syst. Sci. Eng.
دوره 24 شماره
صفحات -
تاریخ انتشار 2009