Secure Multicast for Mobile Commerce Applications: Issues and Challenges

Secure Multicast for Mobile Commerce Applications: Issues and Challenges

Mohamed Eltoweissy (Virginia Tech, USA), Sushil Jajodia (George Mason University, USA) and Ravi Mukkamala (Old Dominion University, USA)
Copyright: © 2005 |Pages: 28
DOI: 10.4018/978-1-59140-345-6.ch008
OnDemand PDF Download:
$37.50

Abstract

With the rapid growth in mobile commerce (m-commerce) applications, the need for providing suitable infrastructure to support these applications has become critical. Secure multicast is a key element of this infrastructure, in particular, to support group m-commerce applications such as mobile auctions, product recommendation systems, and financial services. Despite considerable attention to m-commerce security, most existing security solutions focus on unicast communications. On the other hand, numerous solutions for secure multicast exist that are not specifically designed with m-commerce as a target environment. Clearly, to address secure multicast in m-commerce, we must start by forming a comprehensive picture of the different facets of the problem and its solutions. In this chapter, we identify system parameters and subsequent security requirements for secure multicast in m-commerce. Attacks on m-commerce environments may undermine satisfying these security requirements resulting, at most times, in major losses. We present a taxonomy of common attacks and identify core services needed to mitigate these attacks and provide efficient solutions for secure multicast in m-commerce. Among these services, authentication and key management play a major role. Given the varying requirements of m-commerce applications and the large number of current key management schemes, we provide a taxonomy and a set of performance metrics to aid m-commerce system designers in the evaluation and selection of key management schemes.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgments
Wen-Chen Hu, Chung-wei Lee, Weidong Kou
Chapter 1
Chung-wei Lee, Weidong Kou, Wen-Chen Hu
Without secure commercial information exchange and safe electronic financial transactions over mobile networks, neither service providers nor... Sample PDF
Mobile Commerce Security and Payment Methods
$37.50
Chapter 2
Li Xiong, Ling Liu
This chapter introduces reputation systems as a means of facilitating trust and minimizing risks in m-commerce and e-commerce in general. It first... Sample PDF
Mobile Commerce Security and Payment Methods
$37.50
Chapter 3
Changhua Zhu, Changxing Pei
Intrusion detection and vulnerability analysis play the same important roles in wireless infrastructure as in wired infrastructure. In this chapter... Sample PDF
Intrusion Detection and Vulnerability Analysis of Mobile Commerce Platform
$37.50
Chapter 4
Gregor V. Bochmann, Eric Zhen Zhang
The requirements for an authentication infrastructure for electronic commerce are explained by identifying the partners involved in e-commerce... Sample PDF
A Secure Authentication Infrastructure for Mobile Users
$37.50
Chapter 5
Paolo Bellavista, Antonio Corradi, Cesare Stefanelli
The spreading wireless accessibility to the Internet stimulates the provisioning of mobile commercial services to a wide set of heterogeneous and... Sample PDF
Policy-Based Access Control for Context-Aware Services over the Wireless Internet
$37.50
Chapter 6
Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini
Trust negotiation is a promising approach for establishing trust in open systems like the Internet, where sensitive interactions may often occur... Sample PDF
A Comprehensive XML Based Approach to Trust Negotiations
$37.50
Chapter 7
Jyh-haw Yeh, Wen-Chen Hu, Chung-wei Lee
With the advent of wireless and mobile networks, the Internet is rapidly evolving from a set of connected stationary machines to include mobile... Sample PDF
Security Issues and Possible Countermeasures for a Mobile Agent Based M-Commerce Application
$37.50
Chapter 8
Mohamed Eltoweissy, Sushil Jajodia, Ravi Mukkamala
With the rapid growth in mobile commerce (m-commerce) applications, the need for providing suitable infrastructure to support these applications has... Sample PDF
Secure Multicast for Mobile Commerce Applications: Issues and Challenges
$37.50
Chapter 9
Seema Nambiar, Chang-Tien Lu
Mobile security and payment are central to m-commerce. The shift from physical to virtual payments has brought enormous benefits to consumers and... Sample PDF
M-Payment Solutions and M-Commerce Fraud Management
$37.50
Chapter 10
Jianming Zhu, Jianfeng Ma
This chapter introduces a new micro-payment scheme that is able to apply to multi-party for mobile commerce, which allows a mobile user to pay every... Sample PDF
Multi-Party Micro-Payment for Mobile Commerce
$37.50
Chapter 11
Stamatis Karnouskos, András Vilmos, Antonis Ramfos, Balázs Csik, Petra Hoepner
Many experts consider that efficient and effective mobile payment solutions will empower existing e- and m-commerce efforts and unleash the true... Sample PDF
SeMoPS: A Global Secure Mobile Payment Service
$37.50
Chapter 12
Oguz Kaan Onbilger, Randy Chow, Richard Newman
Mobile agents (MAs) are a promising technology which directly address physical limitations of mobile devices such as limited battery life... Sample PDF
Remote Digital Signing for Mobile Commerce
$37.50
Chapter 13
Quanxing Zhang, Chwan-Hwa Wu, J. David Irwin
A scheme is proposed in this chapter to apply a secure digital signature scheme in a mobile-IP environment and treats the three entities in a... Sample PDF
A Mobile Coalition Key-Evolving Digital Signature Scheme for Wireless/Mobile Networks
$37.50
Chapter 14
R.K. Ghosh, Abhinav Arora, Gautam Barua
We present a proposal to combine the advantages of IPSec and smart cards in order to design a new protocol for secure bi-directional access of... Sample PDF
Smart Card Based Protocol for Secure and Controlled Access of Mobile Host in IPv6 Compatible Foreign Network
$37.50
About the Authors