Secure Multicast for Mobile Commerce Applications: Issues and Challenges

Secure Multicast for Mobile Commerce Applications: Issues and Challenges

Mohamed Eltoweissy, Sushil Jajodia, Ravi Mukkamala
Copyright: © 2005 |Pages: 28
ISBN13: 9781591403456|ISBN10: 1591403456|ISBN13 Softcover: 9781591403463|EISBN13: 9781591403470
DOI: 10.4018/978-1-59140-345-6.ch008
Cite Chapter Cite Chapter

MLA

Eltoweissy, Mohamed, et al. "Secure Multicast for Mobile Commerce Applications: Issues and Challenges." Advances in Security and Payment Methods for Mobile Commerce, edited by Wen-Chen Hu, et al., IGI Global, 2005, pp. 164-191. https://doi.org/10.4018/978-1-59140-345-6.ch008

APA

Eltoweissy, M., Jajodia, S., & Mukkamala, R. (2005). Secure Multicast for Mobile Commerce Applications: Issues and Challenges. In W. Hu, C. Lee, & W. Kou (Eds.), Advances in Security and Payment Methods for Mobile Commerce (pp. 164-191). IGI Global. https://doi.org/10.4018/978-1-59140-345-6.ch008

Chicago

Eltoweissy, Mohamed, Sushil Jajodia, and Ravi Mukkamala. "Secure Multicast for Mobile Commerce Applications: Issues and Challenges." In Advances in Security and Payment Methods for Mobile Commerce, edited by Wen-Chen Hu, Chung-wei Lee, and Weidong Kou, 164-191. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-345-6.ch008

Export Reference

Mendeley
Favorite

Abstract

With the rapid growth in mobile commerce (m-commerce) applications, the need for providing suitable infrastructure to support these applications has become critical. Secure multicast is a key element of this infrastructure, in particular, to support group m-commerce applications such as mobile auctions, product recommendation systems, and financial services. Despite considerable attention to m-commerce security, most existing security solutions focus on unicast communications. On the other hand, numerous solutions for secure multicast exist that are not specifically designed with m-commerce as a target environment. Clearly, to address secure multicast in m-commerce, we must start by forming a comprehensive picture of the different facets of the problem and its solutions. In this chapter, we identify system parameters and subsequent security requirements for secure multicast in m-commerce. Attacks on m-commerce environments may undermine satisfying these security requirements resulting, at most times, in major losses. We present a taxonomy of common attacks and identify core services needed to mitigate these attacks and provide efficient solutions for secure multicast in m-commerce. Among these services, authentication and key management play a major role. Given the varying requirements of m-commerce applications and the large number of current key management schemes, we provide a taxonomy and a set of performance metrics to aid m-commerce system designers in the evaluation and selection of key management schemes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.