Enhancing e-commerce security using GSM authentication

被引:0
|
作者
Khu-smith, V [1 ]
Mitchell, CJ [1 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
e-commerce transactions security; payment protocol; GSM security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Today, e-commerce transactions axe typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that information is stored in clear at the end point of the communication link and the lack of user authentication. Although SSL/TLS does offer the latter, it is optional and usually omitted since users typically do not have the necessary asymmetric key pair. In this paper, we propose a payment protocol in which user authentication is provided using GSM 'subscriber identity authentication'. In the protocol, a consumer is required to possess a GSM mobile station registered under a subscriber name corresponding to that on his/her debit/credit card. The cardholder identity is combined with the GSM subscriber identity in such a way that without a mobile station, in particular the SIM, and the corresponding debit/credit card, an unscrupulous user will find it difficult to make a fraudulent payment at the expense of the legitimate cardholder. This is achieved in such a way that no management overhead is imposed on the user.
引用
收藏
页码:72 / 83
页数:12
相关论文
共 50 条
  • [21] PRIVACY AND SECURITY IN E-COMMERCE
    Mandic, Milan
    [J]. MARKET-TRZISTE, 2009, 21 (02): : 247 - 260
  • [22] Two Way Authentication in MITM Attack to Enhance Security of E-commerce Transactions
    Savita, Rupali
    Datta, Unmukh
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 265 - 274
  • [23] Enhancing the Core Competitiveness of SMEs by Using E-Commerce
    Wei, Zhao
    [J]. AFFECTIVE COMPUTING AND INTELLIGENT INTERACTION, 2012, 137 : 717 - 723
  • [24] Enhancing the Core Competitiveness of SMEs by Using E-Commerce
    Wei, Zhao
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL II, 2010, : 693 - 696
  • [25] Authentication Techniques For E-Commerce Applications: A Review
    Neha
    Chatterjee, Kakali
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 693 - 698
  • [26] Blockchain based Confidentiality and Integrity Preserving Scheme for Enhancing E-commerce Security
    Shaikh, Javed R.
    [J]. 2018 2ND IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN - 2018), VOL II, 2018, : 155 - 158
  • [27] The Security and Prevention of E-Commerce in China
    Qiu, Jianlin
    [J]. ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, 2011, 153 : 162 - 165
  • [28] Research on the Security and Credit of E-commerce
    Gu Guifang
    He Youshi
    [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 92 - 96
  • [29] Research of E-Commerce Security Technology
    Hong, Xie
    [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3548 - 3552
  • [30] Security analysis on mobile E-commerce
    Wang, SM
    Tao, R
    Wang, Y
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 1, 2004, : 642 - 647