A Low Power Security Architecture for Mobile Commerce
نویسندگان
چکیده
+ IHP, Im Technologiepark 25, Frankfurt (Oder), Germany [email protected] Abstract: Mobile devices have limited resources in terms of computational power and energy. With the up-coming wireless Internet a lot of new applications that require security and privacy will be deployed. The exhaustive use of encryption mechanisms will drain down the battery within short time. In this article we present a security architecture that enables mobile devices to negotiate the cipher mechanisms with the infrastructure. Thus, the mobile devices are enabled to exploit the differences in the computational effort required for public and private key operations of RSA and elliptic curve cryptography (ECC). The benefit of this approach is that the mobile only has to execute RSA public key and EC private key operations. We present measurements for a given scenario, showing that by exploiting the differences in the computational effort of RSA and ECC, the computational burden on the mobile can be reduced by up to forty seven times.
منابع مشابه
The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملWireless PKI and Distributed IDS for Securing Intranets and M-Commerce
Recent R/D advances are presented in this keynote address on wireless and security technologies. To access Internet from mobile devices, the existing public key infrastructure (PKI) must be modified to work with limited wireless network bandwidth and low computing and memory capacity of handheld devices. A complete security chain is needed from smart cards to mobile clients, wireless PKI (WPKI)...
متن کاملConcepts and Architecture of a Security-Centric Mobile Agent Server
Mobile software agents are software components that are able to move in a network. They are often considered as an attractive technology in electronic commerce applications. Although security concerns prevail. In this paper we describe the architecture and concepts of the SeMoA server – a runtime environment for Java-based mobile agents. Its architecture has a focus on security and easy extenda...
متن کاملAn onion ring framework for developing and assessing mobile commerce security
A five-layer ‘onion ring’ framework for analysing mobile commerce security requirements and for improving system security performance is presented in this research. Two quantifiable approaches, based on weighted scores applied to either a spider diagram or a decision solution matrix, are used to demonstrate how the security level can actually be objectively measured and evaluated in addition to...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002