Design and Simulation of Mobile Commerce Identity Authentication Protocol Based on OTP

Author(s):  
Qin Wang ◽  
Huifeng Li

With popularization and development of mobile commerce, the security of mobile commerce has drawn more and more attentions. Identity authentication is the first safety barrier, as communication security almost starts from its handshake process. Authentication protocol based on ciper technology is the safest method to realize identity authentication, and therefore identity authentication protocol is necessary to ensure communication security in mobile commerce. Combined One-time password (OTP) with Elliptic Curve Cryptosystem (ECC), a mobile commerce identity authentication (MCIA) protocol is presented. The two procedures of user registration and bidirectional authentication are designed. In order to verify its operation efficiency in the actual network environment, the simulation model of MCIA is set up through Opnet. The MCIA performance is analyzed from the statistics variables, including scheme time, server queuing delay, channel utilization and throughput. The results verify that MCIA has better feasibility in mobile commerce environment.

2011 ◽  
Vol 403-408 ◽  
pp. 2645-2649 ◽  
Author(s):  
Qin Wang ◽  
Fen He Zhi ◽  
Jing Hai Ao

One Time Password (OTP) authentication mechanism has higher security by one time padding. It is implemented simply, cost less and needed no third-party notarization, and so it is more suitable for limited environment in mobile commerce. But OTP has some securities, which it couldn’t resist decimal attack and realize bidirectional identity authentication. Combined with Elliptic curve cryptosystem (ECC), it is presented a mobile identity authentication protocol (MIAP). Through formalized analysis method based on strand space, it is validated to have higher security.


2019 ◽  
Vol 503 ◽  
pp. 129-147 ◽  
Author(s):  
Wei Liang ◽  
Songyou Xie ◽  
Jing Long ◽  
Kuan-Ching Li ◽  
Dafang Zhang ◽  
...  

2018 ◽  
Vol 173 ◽  
pp. 03019
Author(s):  
Qin Li ◽  
Caiming Liu ◽  
Siyuan Jing ◽  
Lijun Du

User identity authentication is the foundation of data transmission in the complicated network environment. Moreover, the key issue is the effective identity authentication of both sides in data transmission. An authentication method for user identity based on two-way confirmation in data transmission is proposed in this paper. The public key, private key, information of traditional identity authentication, one-time transmission key, timestamp, authentication lifecycle for timestamp and other authentication elements are constructed. Based on guaranteeing the timeliness of data transmission, the two-way user identity authentication process for sending terminal and receiving terminal is set up through using the information of traditional identity authentication and one-time transmission key.


Sign in / Sign up

Export Citation Format

Share Document