Mobile Commerce Identity Authentication Protocol Based on Conic Curves

Author(s):  
Zhigang Chen ◽  
Xinxia Song
Author(s):  
Qin Wang ◽  
Huifeng Li

With popularization and development of mobile commerce, the security of mobile commerce has drawn more and more attentions. Identity authentication is the first safety barrier, as communication security almost starts from its handshake process. Authentication protocol based on ciper technology is the safest method to realize identity authentication, and therefore identity authentication protocol is necessary to ensure communication security in mobile commerce. Combined One-time password (OTP) with Elliptic Curve Cryptosystem (ECC), a mobile commerce identity authentication (MCIA) protocol is presented. The two procedures of user registration and bidirectional authentication are designed. In order to verify its operation efficiency in the actual network environment, the simulation model of MCIA is set up through Opnet. The MCIA performance is analyzed from the statistics variables, including scheme time, server queuing delay, channel utilization and throughput. The results verify that MCIA has better feasibility in mobile commerce environment.


2011 ◽  
Vol 403-408 ◽  
pp. 2645-2649 ◽  
Author(s):  
Qin Wang ◽  
Fen He Zhi ◽  
Jing Hai Ao

One Time Password (OTP) authentication mechanism has higher security by one time padding. It is implemented simply, cost less and needed no third-party notarization, and so it is more suitable for limited environment in mobile commerce. But OTP has some securities, which it couldn’t resist decimal attack and realize bidirectional identity authentication. Combined with Elliptic curve cryptosystem (ECC), it is presented a mobile identity authentication protocol (MIAP). Through formalized analysis method based on strand space, it is validated to have higher security.


2019 ◽  
Vol 503 ◽  
pp. 129-147 ◽  
Author(s):  
Wei Liang ◽  
Songyou Xie ◽  
Jing Long ◽  
Kuan-Ching Li ◽  
Dafang Zhang ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Yurong Luo ◽  
Hui Li ◽  
Ruhui Ma ◽  
Zhenyang Guo

The fifth-generation (5G) mobile communication technology has already deployed commercially and become a global research focus. The new features of 5G include unlimited information exchange, a large variety of connections with independent energy, and diversified high transmission rate services. Collective synergy of services is expected to change the way of life and future generations and introduce new converged services to the ICT industry. Different application services have to meet differentiated security demands. From the perspective of security, in order to support the multiservice of 5G services, it is necessary to consider the new security mechanism driven by the service. Based on 5G massive data stream, the 5G system can provide customized real-world services for potential users and reduce the user experience gap in different scenarios. However, 3GPP Extensible Authentication Protocol (EAP), which is the present entity authentication mechanism for the 5G service layer, is only an individual authentication architecture and unable to fulfill the flexible security objectives of differentiated services. In this paper, we present a new hierarchical identity management framework as well as an adaptable and composable three-factor authentication and session key agreement protocol for different applications in 5G multiservice systems. Finally, we propose an authorization process by combining with the proposed three-factor authentication mechanism and Service-Based Architecture (SBA) proposed by the 3GPP committee. The proposed mechanism can concurrently provide diverse identity authentication schemes corresponding to four different security levels by easily splitting or assembling three-factor authentication protocol blocks. The proposed scheme can be simultaneously applied to a variety of applications to improve the efficiency and quality of service and reduce the complexity of the whole 5G multiservice system, instead of designing or adopting several different authentication protocols. The performance evaluation results indicate that the proposed scheme can guarantee the multiple security of the system with ideal efficiency.


Sign in / Sign up

Export Citation Format

Share Document