Enhancing e-commerce security using GSM authentication

被引:0
|
作者
Khu-smith, V [1 ]
Mitchell, CJ [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
e-commerce transactions security; payment protocol; GSM security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Today, e-commerce transactions axe typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that information is stored in clear at the end point of the communication link and the lack of user authentication. Although SSL/TLS does offer the latter, it is optional and usually omitted since users typically do not have the necessary asymmetric key pair. In this paper, we propose a payment protocol in which user authentication is provided using GSM 'subscriber identity authentication'. In the protocol, a consumer is required to possess a GSM mobile station registered under a subscriber name corresponding to that on his/her debit/credit card. The cardholder identity is combined with the GSM subscriber identity in such a way that without a mobile station, in particular the SIM, and the corresponding debit/credit card, an unscrupulous user will find it difficult to make a fraudulent payment at the expense of the legitimate cardholder. This is achieved in such a way that no management overhead is imposed on the user.
引用
收藏
页码:72 / 83
页数:12
相关论文
共 50 条
  • [1] Information security: Mutual authentication in e-commerce
    Von Solms, SH
    Kisimov, MV
    [J]. ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY, 2001, 78 : 15 - 31
  • [2] Authentication in e-commerce
    Basu, A
    Muylle, S
    [J]. COMMUNICATIONS OF THE ACM, 2003, 46 (12) : 159 - 166
  • [3] Enhanced E-commerce application security using Three-factor Authentication
    Scaria, Binitha Ann
    Megalingam, Rajesh Kannan
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 1588 - 1591
  • [4] Design of RFID security authentication protocol for e-commerce service
    School of Computer Science, Sichuan University of Science and Engineering, Zigong Sichuan, China
    不详
    不详
    [J]. Metall. Min. Ind., 9 (506-512): : 506 - 512
  • [5] A Penetration Testing Method for E-Commerce Authentication System Security
    Pan, Wei
    Li, Weihua
    [J]. ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 449 - +
  • [6] E-commerce security
    Gollmann, D
    [J]. COMPUTING & CONTROL ENGINEERING JOURNAL, 2000, 11 (03): : 115 - 118
  • [7] Security in e-commerce
    Müller, G
    [J]. LECTURES IN E-COMMERCE, 2001, : 149 - 162
  • [8] E-commerce security
    Gollmann, Dieter
    [J]. Elektron, 2001, 18 (03): : 44 - 47
  • [9] On the Security of e-commerce
    Razvan, Raducanu
    Eduard, Omusoru
    [J]. RECENT ADVANCES IN MATHEMATICS AND COMPUTERS IN BUSINESS, ECONOMICS, BIOLOGY & CHEMISTRY, 2010, : 171 - 174
  • [10] E-Commerce security
    Al-Slamy, Nada M. A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (05): : 340 - 344