Design Limitations Characteristicsand Analysis of Secure Mobile Transaction and Protocols
نویسندگان
چکیده
Today, new technologies that allow cellular (mobile) phones and other handheld devices to access the Internet have made wireless business transactions possible. This phenomenon is known as mobile commerce or M-Commerce. What must be done to secure financial transactions via mobile commerce? Due to the advent of the Internet, electronic business transactions have exploded around the globe. Generally speaking, M-Commerce creates more security concerns than traditional E-Commerce. Mobile payment is defined as any payment transaction involving the purchase of goods or services that is completed with a wireless device. In this paper let us have a brief survey on security issues when designing, implementing, and deploying secure m-payment systems with a focus on threats, vulnerabilities and risk. The first problems come from the limitation of wireless environments that are primarily from mobiles devises which have connection cost, low bandwidth, and low reliability. The second problem is the lack of sufficient security of existing mobile payment systems mainly due to improper protocol design and deployment of lightweight cryptographic operations. . . Keywordscryptographic operations, micropayment protocol, m-payment, , mobile devices.
منابع مشابه
Secure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملEstablishing Multi-level Security in Mobile Data Access
Transaction processing over mobile networks faces new challenges due to limitations in bandwidth and available power, as well as due to intermittent connectivity that causes loss of data and transaction aborts. Besides, the possibility of security breach increases substantially due to the frequent motion of clients across cells, which gives rise to novel forms of covert channels. In this paper,...
متن کاملPerformance Analysis of a Connection Fault-Tolerant Model for Distributed Transaction Processing in Mobile Computing Environment
Mobile embedded systems increasingly use transactions for applications like mobile inventory, mobile commerce or commercial applications. Yet, many issues are challenging and need to be resolved before enabling mobile devices to take part in distributed computing. Mobile environment limitations make it harder to design appropriate and efficient commit protocols. There are a handful of protocols...
متن کاملConnection Interface Designing for Grid and Mobile Devices
There area lot of mobile computer devices with a variety of applications and users Tend to use them more. Due to the limitations of mobile devices, running most of the procedures are impossible. To resolve this problem, mobile devices can be connected to the grid, to use the facilities of grid. On the other hand the communication mechanisms are different for each device and they cannot be c...
متن کاملConnection Interface Designing for Grid and Mobile Devices
There area lot of mobile computer devices with a variety of applications and users Tend to use them more. Due to the limitations of mobile devices, running most of the procedures are impossible. To resolve this problem, mobile devices can be connected to the grid, to use the facilities of grid. On the other hand the communication mechanisms are different for each device and they cannot be c...
متن کامل