A Low Power Security Architecture for Mobile Commerce

نویسندگان

  • Peter Langendoerfer
  • Zoya Dyka
  • Oliver Maye
  • Rolf Kraemer
چکیده

+ IHP, Im Technologiepark 25, Frankfurt (Oder), Germany [email protected] Abstract: Mobile devices have limited resources in terms of computational power and energy. With the up-coming wireless Internet a lot of new applications that require security and privacy will be deployed. The exhaustive use of encryption mechanisms will drain down the battery within short time. In this article we present a security architecture that enables mobile devices to negotiate the cipher mechanisms with the infrastructure. Thus, the mobile devices are enabled to exploit the differences in the computational effort required for public and private key operations of RSA and elliptic curve cryptography (ECC). The benefit of this approach is that the mobile only has to execute RSA public key and EC private key operations. We present measurements for a given scenario, showing that by exploiting the differences in the computational effort of RSA and ECC, the computational burden on the mobile can be reduced by up to forty seven times.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

Wireless PKI and Distributed IDS for Securing Intranets and M-Commerce

Recent R/D advances are presented in this keynote address on wireless and security technologies. To access Internet from mobile devices, the existing public key infrastructure (PKI) must be modified to work with limited wireless network bandwidth and low computing and memory capacity of handheld devices. A complete security chain is needed from smart cards to mobile clients, wireless PKI (WPKI)...

متن کامل

Concepts and Architecture of a Security-Centric Mobile Agent Server

Mobile software agents are software components that are able to move in a network. They are often considered as an attractive technology in electronic commerce applications. Although security concerns prevail. In this paper we describe the architecture and concepts of the SeMoA server – a runtime environment for Java-based mobile agents. Its architecture has a focus on security and easy extenda...

متن کامل

An onion ring framework for developing and assessing mobile commerce security

A five-layer ‘onion ring’ framework for analysing mobile commerce security requirements and for improving system security performance is presented in this research. Two quantifiable approaches, based on weighted scores applied to either a spider diagram or a decision solution matrix, are used to demonstrate how the security level can actually be objectively measured and evaluated in addition to...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002