The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

被引:6
|
作者
Hu, Liang [2 ]
Chi, Ling [2 ]
Li, Hong-tu [1 ]
Yuan, Wei [1 ]
Sun, Yuyu [1 ]
Chu, Jian-feng [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130023, Peoples R China
[2] Jilin Univ, Software Coll, Changchun 130023, Peoples R China
关键词
Authentication; mobile payment; M2M; security issues; wireless network; ANONYMITY;
D O I
10.3837/tiis.2012.01.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.
引用
收藏
页码:131 / 146
页数:16
相关论文
共 50 条
  • [1] An Authentication and Key Establishment Scheme to Enhance Security for M2M in 6LoWPANs
    Qiu, Yue
    Ma, Maode
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 2671 - 2676
  • [2] Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security
    Doh, Inshil
    Chae, Kijoon
    Lim, Jiyoung
    Chung, Min Young
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (04): : 543 - 558
  • [3] An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application
    Jeon, You-Boo
    Lee, Keun-Ho
    Park, Doo-Soon
    Jeong, Chang-Sung
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [4] A Dynamic-Encryption Authentication Scheme for M2M Security in Cyber-Physical Systems
    Chen, Shuo
    Ma, Maode
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 2897 - 2901
  • [5] An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems
    Chen, Shuo
    Ma, Maode
    Luo, Zhenxing
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1146 - 1157
  • [6] An Application Management Scheme Among M2M Gateways
    Kuo, Wen-Hsing
    Lu, Ya-Yang
    Lu, Ying-Hsueh
    [J]. 2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2015, : 275 - 276
  • [7] A Chaos-based Authentication and Key Management Scheme for M2M Communication
    Boubakri, Wided
    Abdallah, Walid
    Boudriga, Noureddine
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 366 - 371
  • [8] Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading
    Lin, Yi-Hui
    Huang, Jheng-Jia
    Fan, Chun-I
    Chen, Wen-Tsuen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 3209 - 3219
  • [9] Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
    Coruh, Ugur
    Bayat, Oguz
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [10] M2M Security: Challenges and Solutions
    Barki, Amira
    Bouabdallah, Abdelmadjid
    Gharout, Said
    Traore, Jacques
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1241 - 1254