The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

被引:6
|
作者
Hu, Liang [2 ]
Chi, Ling [2 ]
Li, Hong-tu [1 ]
Yuan, Wei [1 ]
Sun, Yuyu [1 ]
Chu, Jian-feng [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130023, Peoples R China
[2] Jilin Univ, Software Coll, Changchun 130023, Peoples R China
关键词
Authentication; mobile payment; M2M; security issues; wireless network; ANONYMITY;
D O I
10.3837/tiis.2012.01.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.
引用
收藏
页码:131 / 146
页数:16
相关论文
共 50 条
  • [21] M2M: From Mobile to Embedded Internet
    Wu, Geng
    Talwar, Shilpa
    Johnsson, Kerstin
    Himayat, Nageen
    Johnson, Kevin D.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (04) : 36 - 43
  • [22] Mobile and remote operation for M2M application in upcoming u-Manufacturing
    Kim, Dong-Hoon
    Song, Jun-Yeob
    [J]. JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY, 2008, 22 (01) : 12 - 24
  • [23] Cloud computing for ubiquitous computing on M2M and IoT environment mobile application
    DongBum Seo
    You-Boo Jeon
    Song-Hee Lee
    Keun-Ho Lee
    [J]. Cluster Computing, 2016, 19 : 1001 - 1013
  • [24] Cloud computing for ubiquitous computing on M2M and IoT environment mobile application
    Seo, DongBum
    Jeon, You-Boo
    Lee, Song-Hee
    Lee, Keun-Ho
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (02): : 1001 - 1013
  • [25] Mobile and remote operation for M2M application in upcoming u-manufacturing
    Kim Dong-Hoon
    Song Jun-Yeob
    [J]. Journal of Mechanical Science and Technology, 2008, 22 : 12 - 24
  • [26] Terminal Authentication in M2M Communications in the Context of Internet of Things
    Ranjan, Aditya Kaushal
    Hussain, Muzzammil
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 34 - 42
  • [27] Token-based authentication method for M2M platforms
    Polat, Huseyin
    Oyucu, Saadin
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (04) : 2956 - 2967
  • [28] M2M Security Technology of CPS Based on Blockchains
    Yin, Shiyong
    Bao, Jinsong
    Zhang, Yiming
    Huang, Xiaodi
    [J]. SYMMETRY-BASEL, 2017, 9 (09):
  • [29] An Improved Random Access Scheme for M2M Communications
    Yali Wu
    Guixia Kang
    Yanyan Guo
    Xia Zhu
    Ningbo Zhang
    [J]. China Communications, 2016, 13 (06) : 12 - 21
  • [30] A Mobile Device-Based Virtualization Technique for M2M Communication in Cloud Computing Security
    Cagalaban, Giovanni
    Kim, Seoksoo
    Kim, Minho
    [J]. COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 160 - 167