Nothing Special   »   [go: up one dir, main page]

Skip to main content

Security Enhancement on Mobile Commerce

  • Conference paper
  • First Online:
The Human Society and the Internet Internet-Related Socio-Economic Issues (HSI 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2105))

Included in the following conference series:

Abstract

Mobile commerce is more than a mobile and wireless extension of the Web-based e-commerce. It is being spurred by the mobile phone industry’s widespread support of the Wireless Application Protocol. WTLS (Wireless Transport Layer Security) is based on the industry-standard TLS protocol, is optimised for use over narrow-band communication channels and is used with the WAP transport protocols. Since mobile commerce differs to “fixed” commerce in instantaneous delivery, micro payment and mobile context, a userfriendly payment scheme and user authentication is required. But poor power and memory of mobile terminals must be taken into account when cryptographic algorithms are chosen. Through mobile application survey, we found that the security levels of request and response data are different and request data is more important. In order to upgrade both total security level and performance, we proposed a security enhancement mechanism, in which security parameters of request and response data are processed separately. We made algorithms code value changed with meaningful most left two bits in WTLS handshake.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. WAP Forum: Wireless Application Protocol Architecture Specification, version 1.2, WAP Forum (1998)

    Google Scholar 

  2. T. Dierks, C. Allen: The TLS Protocol Version 1.0, RFC2246 (1999)

    Google Scholar 

  3. Understanding Security on the Wireless Internet, Phone.com (2000)

    Google Scholar 

  4. WAP Forum: Wireless Transport Layer Security Specification, version 1.2 (1999)

    Google Scholar 

  5. Martin Christinat, Markus Lsler: WTLS-The security layer in the WAP stack, keyon (2000)

    Google Scholar 

  6. H. Krawczyk, M. Bellare, R. Canetti: HMAC: Keyed-Hashing for Message Authentication, RFC2104 (1997)

    Google Scholar 

  7. D. Stinson: Cryptography Theory and Practice, CRC Press, Boca Raton (1995)

    MATH  Google Scholar 

  8. B. Schneier: Applied Cryptography, 2nd ed., Wiley, New York (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kwon, EK., Cho, YG., Chae, KJ. (2001). Security Enhancement on Mobile Commerce. In: Kim, W., Ling, TW., Lee, YJ., Park, SS. (eds) The Human Society and the Internet Internet-Related Socio-Economic Issues. HSI 2001. Lecture Notes in Computer Science, vol 2105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47749-7_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-47749-7_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42313-3

  • Online ISBN: 978-3-540-47749-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics