A Trusted Mobile Payment Scheme Based on Body Area Networks
نویسندگان
چکیده
With the development of intelligent mobile phones and the improvement of wireless communication infrastructure, mobile payment is gradually accepted by the public. However, since intelligent mobile phones are not trusted devices, mobile payment faces serious security problems. To address the problems, this paper designs a trusted mobile payment scheme based on body area networks. The scheme builds a bridge between a body area network deployed on the human body and an intelligent mobile phone by the fuzzy vault technology and the human interference, and imports the security from a body area network to the mobile payment to establish a trusted mobile payment system. Because the scheme uses PPG signals with high-entropies to produce authentication data, its security is superior to traditional mobile payment schemes; at the same time the scheme uses trusted body area networks to design mobile payment systems and does not use external trusted devices, which is convenient to the users.
منابع مشابه
A Rssi Based Localization Algorithm for WSN Using a Mobile Anchor Node
Wireless sensor networks attracting a great deal of research interest. Accurate localization of sensor nodes is a strong requirement in a wide area of applications. In recent years, several techniques have been proposed for localization in wireless sensor networks. In this paper we present a localization scheme with using only one mobile anchor station and received signal strength indicator tec...
متن کاملMultiparty micropayments for ad hoc networks
The majority of ad hoc networks and their associated applications have been designed with closed user groups in mind. In such scenarios all the nodes in the network usually belong to a single authority and are configured to cooperate in the relaying of packets within the network. In recent years however, ad hoc networks have also found their way into everyday networking environments, where mobi...
متن کاملAn Efficient Conic Curve Threshold Digital Signature
We propose a new threshold signature scheme based on conic curve. The security of the proposed threshold signature scheme is based on the difficulty of computing the DLP in conic curve groups. It can resist some of the known attacks. Since an exciting characteristic of conic is both encoding and decoding over conic are easily implemented, it can be used in the mobile payment system with the lim...
متن کاملAn Anonymous Mobile Payment System based on a Group Blind Signature Scheme
In this paper we propose an anonymous mobile payment system based on a group blind signature scheme in order to prevent blackmailing. The message transfer from the customer to the merchant occurs only once during the payment protocol. Also, the amount of communication between customer and merchant is about 900 Bytes. Therefore, our mobile payment system can be used in the wireless networks with...
متن کاملIdentity-Based Key Management in MANETs using Public Key Cryptography
Wireless mobile Ad Hoc Networks (MANETs) are an emerging area of mobile computing. MANETs face serious security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, deploying a robust and reliable security scheme such as Public Key Infrastructure (PKI) requires a central authority or trusted third p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EAI Endorsed Trans. Indust. Netw. & Intellig. Syst.
دوره 2 شماره
صفحات -
تاریخ انتشار 2015