Dissertation > Excellent graduate degree dissertation topics show

Study of Off-line Authentication Model for Mobile Electronic Commerce

Author: ChenWenXing
Tutor: ZhangYi
School: Chongqing University of Posts and Telecommunications
Course: Communication and Information System
Keywords: Mobile Electronic Commerce Identity Authentication Combined Public Key BAN logic End-to-End protocol
CLC: F713.36
Type: Master's thesis
Year: 2009
Downloads: 57
Quote: 0
Read: Download Dissertation


With the fast development of mobile communication technology and internet, Mobile Electronic Commerce has become the new direction of Electronic Commerce becauseof its character: convenience and immanence. At the same time, the security of Mobile Electronic Commerce has also become more and more austere.In wired networks, PKI got the widespread approbation in guaranteeing the information security, identity authentication, information integrity and non-repudiation. WPKI has been improved compared with PKI in mobile communication fields. However, WPKI system didn’t resolve the problem of security really because of small memory, low computing capacity in mobile terminal and low band in wireless network. The CPK algorithm based on identity is much suitable for mobile environment owing to it’s small expenditure, off-line character.In this paper, Combined Public Key (CPK) principle has been analyzed in detail and Off-line Authentication Model for Mobile Electronic Commerce has been offered considering the requirement of security for Mobile Electronic Commerce. Public key factor matrix is small and can be saved in smart card in mobile terminal. Customer public key can be computed through customer ID and a given mapping algorithm. Because of supporting multi-ID-field and multi-security-field character in CPK algorithm, customer can realize General Card in different Mobile Electronic Commerce conveniently. In the Off-line Authentication Model, owing to no certificate query and verification process, mobile terminal and application server can realize bidirectional identity authentication through signature and signature verification. In this paper, end-to-end identity authentication and key agreement protocol for this model has been proposed and the aim of bidirectional identity authentication and key agreement can be reached through two messages. Subsequently, we analyze the protocol by BAN logic.At present, the study for authentication system based-on CPK is on the statement of initial stage and the application of the system on Mobile Electronic Commerce is little. In this paper, simulator implement on function for the model has been realized. Because the essential of authentication system is to manage the public key, we compare the efficiency on obtaining public key of CPK system with WPKI system and CPK is more excellent. At last, the advantages and the shortcomings for Mobile Electronic Commerce Authentication System are analyzed in details comparing with WPKI system.

Related Dissertations

  1. The Rearch and Implement of the Safety Voice Gateway,TP393.08
  2. The Improvement of CPK and the Design and Analysis of Electronic Payment Protocols Based on CPK,TP393.08
  3. Pervasive systems model of privacy protection,TP393.08
  4. And type of defects in anti-replay attack authentication protocol design and analysis,TP393.08
  5. An Novel BAN-Liked Logic for Security Protocol Analysis and Its Automatic Implementation,TP393.08
  6. Research and Design of RFID security authentication protocol based on Hash function,TP391.44
  7. The Research and Implement of Access Control Mechanism Based on SSL Protocol,TP393.08
  8. Research and Design of RFID Security Authentication Protocol,TP391.44
  9. Research of Related Authentication Mechanism of WLAN,TP393.17
  10. Research and Implementation of WAPI Authentication Mechanism,TP393.08
  11. A Research on the Formal Analysis of Quantum Cryptography Protocols,O413
  12. The Study and Design on Secure Micro-Payment System,TP311.52
  13. The Design and Implementation of Bluetooth security protocol,TN925
  14. Research on Key Management of Secure Multicast,TP393.08
  15. Security Protocol Analysis and Verification Based on Model Checker SPIN,TP393.08
  16. Design of a Control System Based on Mobile Auto Seller,TH692.62
  17. The Study of Chinese Mobile Electronic Commerce Value Chain,F724.6
  18. Mobile e-commerce in the lottery industry,F724.6
  19. The Design and Study on an Identity-based Authentication Architecture for Mobile IPv6,TP393.08
  20. Token-Based Single Sign-On Protocol and Its Application,TN918

CLC: > Economic > Trade and Economic > Domestic Trade and Economic > The circulation of commodities and the market > Sale of goods > E-commerce,online trading
© 2012 www.DissertationTopic.Net  Mobile