Reference Hub3
Secure Multicast for Mobile Commerce Applications: Issues and Challenges

Secure Multicast for Mobile Commerce Applications: Issues and Challenges

Mohamed Eltoweissy, Sushil Jajodia, Ravi Mukkamala
ISBN13: 9781599049434|ISBN10: 1599049430|EISBN13: 9781599049441
DOI: 10.4018/978-1-59904-943-4.ch077
Cite Chapter Cite Chapter

MLA

Eltoweissy, Mohamed, et al. "Secure Multicast for Mobile Commerce Applications: Issues and Challenges." Electronic Commerce: Concepts, Methodologies, Tools, and Applications, edited by Annie Becker, IGI Global, 2008, pp. 930-951. https://doi.org/10.4018/978-1-59904-943-4.ch077

APA

Eltoweissy, M., Jajodia, S., & Mukkamala, R. (2008). Secure Multicast for Mobile Commerce Applications: Issues and Challenges. In A. Becker (Ed.), Electronic Commerce: Concepts, Methodologies, Tools, and Applications (pp. 930-951). IGI Global. https://doi.org/10.4018/978-1-59904-943-4.ch077

Chicago

Eltoweissy, Mohamed, Sushil Jajodia, and Ravi Mukkamala. "Secure Multicast for Mobile Commerce Applications: Issues and Challenges." In Electronic Commerce: Concepts, Methodologies, Tools, and Applications, edited by Annie Becker, 930-951. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-943-4.ch077

Export Reference

Mendeley
Favorite

Abstract

With the rapid growth in mobile commerce (m-commerce) applications, the need for providing suitable infrastructure to support these applications has become critical. Secure multicast is a key element of this infrastructure, in particular, to support group m-commerce applications such as mobile auctions, product recommendation systems, and financial services. Despite considerable attention to m-commerce security, most existing security solutions focus on unicast communications. On the other hand, numerous solutions for secure multicast exist that are not specifically designed with m-commerce as a target environment. Clearly, to address secure multicast in m-commerce, we must start by forming a comprehensive picture of the different facets of the problem and its solutions. In this chapter, we identify system parameters and subsequent security requirements for secure multicast in m-commerce. Attacks on m-commerce environments may undermine satisfying these security requirements resulting, at most times, in major losses. We present a taxonomy of common attacks and identify core services needed to mitigate these attacks and provide efficient solutions for secure multicast in m-commerce. Among these services, authentication and key management play a major role. Given the varying requirements of m-commerce applications and the large number of current key management schemes, we provide a taxonomy and a set of performance metrics to aid m-commerce system designers in the evaluation and selection of key management schemes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.