ASEMC: Authentication for a SEcure M-Commerce

نویسندگان

  • Christina Braz
  • Esma Aïmeur
چکیده

We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans network (intercommunicate) continually with wireless (mobile) devices. In this paper, we propose a new mobile authentication system, not yet implemented, called “AuthenLink”, coupled with a new approach to distinguishing characteristics to authenticate people (authentication factor): something you CONVEY. The utmost purpose of this paper is to provide an ease, user-centred and acceptable security authentication system against fraud, counterfeit, and theft for the mobile commerce (m-Commerce) domain, more specifically for mobile devices. Our authentication system achieves its goal through a microprocessor chip (ChipTag) computer implanted under human skin. This ChipTag is able to authenticate user’s access to systems, connect them wirelessly, through the Radio Frequency Identification (RFID) technology, and enable mobile devices perform mobile transactions, access files, or shop online.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Robust Biometric Authentication and PIN Distribution Technique for Secure Mobile Commerce Applications

In a mobile emerging world, user authentication, service provider authentication and security is very important in mobile commerce. User authentication is performed by using fingerprint based biometric methodology. Existing system used for Mobile purchasing/payment services in handheld devices does not analyze fingerprint matching and feature extraction techniques in an efficient way. Also the ...

متن کامل

M-Identity and Its Authentication Protocol for Secure Mobile Commerce Applications

Mobile commerce (m-commerce) delivers value-added services to existing customers and creates new market opportunities. However, establishing a secure m-commerce platform that offers high level of service can be challenging. This paper proposes a biometric-based digital identity authentication (BDIA) protocol targeted at m-commerce applications. In the BDIA protocol, m-identity includes both use...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005