The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment |
Hu, Liang
(Software College, Jilin University)
Chi, Ling (Software College, Jilin University) Li, Hong-Tu (College of Computer Science and Technology, Jilin University) Yuan, Wei (College of Computer Science and Technology, Jilin University) Sun, Yuyu (College of Computer Science and Technology, Jilin University) Chu, Jian-Feng (College of Computer Science and Technology, Jilin University) |
1 | Tomi. Dahlberg, Niina. Mallat, Jan. Ondrus and Agnieszka. Zmijewska, "Past, present and future of mobile payments research: A literature review," in Proc. of Electronic Commerce Research and Applications, vol. 7, no. 2, pp. 165-181, 2008. DOI ScienceOn |
2 | Li. Yunhong and Luo. Siwen, "Research on mobile payment in the e-commerce," in Proc. of International Conference on Management of E-commerce and E-government, pp. 100-103, 2008. |
3 | Zhang. Qinghua, "Mobile Payment in Mobile E-commerce," in Proc. of 7th World Congress on Intelligent Control and Automation, vol. S, pp. 1-23, 2008. |
4 | Ayo. Charles K, Ekong.Uyinomen.O and Fatudimu. Ibukun. T, "The prospects of m-Commerce implementation: Issues and trends," in Proc. of Information Management in The Networked Economy: Issues & Solutions, pp. 210-217, 2007. |
5 | Kaland. Kjell Olav, Rong. Chunming and Geng. Yang, "An e-wallet system with decentralized management," in Proc. of Management of E-Commerce and E-Government, pp. 35-50, 2007. |
6 | Manochehri. Naser-Nick, AlHinai. Yousuf, "Mobile phone users attitude towards mobile commerce (m-commerce) and mobile services in oman," in Proc. of 2nd IEEE/IFIP International Conference in Central Asia on Internet, pp. 164-169, 2006. |
7 | Vanneste. P, "Mobile payment transactions," in Proc. of Securing Electronic Business Processes, pp. 155-163, 2004. |
8 | M. Bohge and W. Trappe, "An authentication framework for hierarchical ad hoc sensor networks," in Proc. of ACM Workshop Wireless Security, pp. 79-87, 2003. |
9 | S. Schmidt, H. Krahn, S. Fischer, and D. Watjen, "A security architecture for mobile wireless sensor networks," in Proc. of 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS), 2004. |
10 | D. D. Hwang, B.C.C. Lai and I. Verbauwhede, "Energy-memory-security tradeoffs in distributed sensor networks", in Proc. of Lecture Notes in Computer Science on Ad-Hoc, Mobile, and Wireless Networks, vol. 3158, 2004. |
11 | N. R. Potlapally, S. Ravi, A. Raghunathan and N.K. Jha, "Analyzing the energy consumption of security protocols," in Proc. of the 2003 International Symposium on Low Power Electronics and Desig, pp. 30-35, 2003. |
12 | J. Lopez, "Unleashing public-key cryptography in wireless sensor networks," in Proc. of Journal of Computer Security, vol. 14, no. 5, pp. 469-482, 2006 |
13 | Chen. Xin, "The applications of mobile payment," in Proc. of High Performance Networking, Computing, Communication Systems and Mathematical Foundations, vol. 66, pp. 62-67, 2010. |
14 | Rad. Habibollah. Arasteh, Tehrani. Mohamad. Bagher and Samsudin. Khairulmizam, "A simple and highly secure protocol for POS termina," in Proc. of 2nd International Conference on Environmental and Computer Science, pp. 204-207, 2009 |
15 | Shin. Dong-Hee, "Modeling the interaction of users and mobile payment system: Conceptual framework," in Proc. of International Journal of Human-Computer Interaction, vol. 26, no. 10, pp. 917-940, 2010. DOI ScienceOn |
16 | Manvi. S. S, Bhajantri. L.B and Vijayakumar.M.A.l, "Secure mobile payment system in wireless environment," in Proc. of International Conference on Future Computer and Communication, pp. 31-35, 2009. |
17 | Harb. Hany, Farahat. Hassan and Ezz. Mohamed, "SecureSMSPay: Secure SMS mobile payment model," in Proc. of 2nd International Conference on Anti-counterfeiting, Security and Identification, pp. 11-17, 2008 |
18 | Nami. Mohammad. Reza, "E-Banking: Issues and challenges," in Proc. of 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel Distributed, pp. 263-266, 2009. |
19 | Wang. Yan, Wong. Duncan. S and Wang. Huaxiong, "Employ a mobile agent for making a payment," in Proc. of Journal Mobile Information Systems, vol. 4, no. 1, pp. 51-68, 2008. |
20 | Tabandehjooy. Ali Akbar and Nazhand. Navid, "A lightweight and secure protocol for mobile payments via wireless internet in m-commerce," in Proc. of 2010 International Conference on E-education, E-business, E-management and E-learning: IC4E 2010, pp. 495-498, 2010 |
21 | W. Stallings, "Cryptography and Network Security- Principles and Practices," Upper Saddle River, NJ: Prentice Hall, 2003. |
22 | Fan. Rong, He. Dao-jing and Pan. Xue-zeng, "An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks," in Proc. of Journal of Zhejiang University-science C-computers & Electronics, vol. 12, no. 7, pp. 550-560, 2011. DOI ScienceOn |
23 | Y. W. Law, J. Doumen, and P. Hartel, "Benchmarking block ciphers for wireless sensor networks," in Proc. of IEEE International Conference Mobile Ad-hoc Sensor Systems, 2004, pp. 447-456. |
24 | D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in tinyOS based on elliptic curve cryptography," in Proc. of 1st IEEE International Conf. Sensor Ad Hoc Communucatuib Networks, pp. 71-80, 2004. |
25 | G. Gaubatz, J.-P. Kaps, and B. Sunar, "Public key cryptography in sensor networks-revisited," in Proc. of 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS), 2004. |
26 | Guangsong. Li, Jianfeng. Mab, Qi. Jiang and Xi. Chenb, "A novel re-authentication scheme based on tickets in wireless local area networks," in Proc. of Journal Parallel and Distributed Computing, vol. 71, no. 7, pp. 906-914, 2011. DOI ScienceOn |
27 | H.C. Hsiang and W.K. Shih, "Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment," in Proc. of Joucnal Computer Standards & Interfaces, vol. 31, no. 6, pp. 1118-1123, 2009. DOI ScienceOn |
28 | C.C. Lee, M.S. Hwang and I.E. Liao, "Security enhancement on a new authentication scheme with anonymity for wireless environments," in Proc. of IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683-1687, 2006. |
29 | C.C. Wu, W.B. Lee and W.J. Tsaur, "A secure authentication scheme with anonymity for wireless communications," in Proc. of IEEE Communications Letters, vol. 12, no. 10, pp. 722-723, 2008. |
30 | C.C. Chang, C.Y. Lee and Y.C. Chiu, "Enhanced authentication scheme with anonymity for roaming service in global mobility networks," in Proc. of Journal Communications, vol. 32, no. 4, pp. 611-618, 2009. |
31 | Mun Hyeran, Han Kyusuk and Lee Yan Sun, "Enhanced secure anonymous authentication scheme for roaming service in global mobility networks," in Proc. of Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 214-222, 2012. DOI ScienceOn |
32 | Tao. Zhou and Jing. Xu, "Provably secure authentication protocol with anonymity for roaming service in global mobility networks," in Proc. of Computer Networks, vol. 55, no. 1, pp. 205-213, 2011. DOI ScienceOn |
33 | A. S. Wander, N. Gura, H. Eberle, V. Gupta, S. C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proc. of the Third IEEE International Conference on Pervasive Computing and Communication, pp. 324-328, 2005. |
34 | L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls and I. Verbauwhede, "Public-key cryptography for RFID-tags," in Proc. of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 217-222, 2007. |
35 | Y. Oren and M. Feldhofer, "A low-resource public-key identification scheme for RFID tags and sensor nodes," in Proc. of the Second ACM Conference on Wireless Network Security, pp. 59-68, 2009. |
36 | H. Chan, A. Perrig and D. Song, "Random key predistribution schemes for sensor networks," in Proc. of Symposium on Security and Privacy 2003, pp. 197-213, 2003 |
37 | Jiang. Hua, "Study on mobile e-commerce security payment aystem," in Proc. of The International Symposium on Electronic Commerce and Security, pp. 745-757, 2008. |
38 | W. Du, J. Deng, Y.S. Han and P.K. Varshney, "A pairwise key predistribution scheme for wireless sensor networks,", in Proc. of 10th ACM Conference on Computer and Communications Security, pp. 42-51, 2003. |
39 | Delgado-Mohatar. Oscar,Fuster-Sabater. Amparo and Sierra. Jose. M, "A light-weight authentication scheme for wireless sensor networks," in Proc. of Journal Ad Hoc Networks, vol. 9, no. 5, pp. 727-735, 2011. DOI ScienceOn |
40 | Ahmed. Adel. Ali and Fisal. Norsheila. Fisal, "Secure real-time routing protocol with load distribution in wireless sensor networks," in Proc. of Security and Communication Networks, vol. 4, no. 8, pp.839-859, 2011. DOI |
41 | Abidi. B.R, Aragam. N.R, Yao. Y and Abidi. MA, "Survey and analysis of multimodal sensor planning and integration for wide area surveillance," in Proc. of ACM Computer Surveys, vol. 41, no. 1, 2008. |
42 | Mendes. LDP and Rodrigues. JJPC, "A survey on cross-layer solutions for wireless sensor networks," in Proc. of Journal of network and computer applications, vol. 34, no. 2, pp. 523-534, 2011. DOI ScienceOn |
43 | Axel. Glanz and Oliver. Jung, "Machine-to-machine kommunikition," in Proc. of Campus Verlag, pp. 7-14, 2010. |
44 | Cha. Inhyok, Shah. Yogendra and Schmidt. Andreas U, "Trust in M2M communication," in Proc. of IEEE Vehicular Technology Magazine, vol. 4, no. 3 pp. 69-75, 2009. |
45 | Chang. Kim, Soong. Anthony and Tseng. Mitch, "Global wireless machine-to-machine standardization," in Proc. of IEEE Internet Computing, vol. 15, no. 2, pp. 64-69, 2011. |
46 | Dai. GuoHua, LI. BaoRong and L1U. ZhaoYuan, "M2M industry development status and problems," Guangzhou Research Institute of China Telecom Co. L TD.2008. |
47 | Ramfos. A, Karnouskos. S and Vilmos. A, "SEMOPS: Paying with mobile personal devices," in Proc. of International Federation for Information Processing, vol. 146, pp. 247-261, 2004. |
48 | Li. Xinghua, Lu. Xiang and Ma. Jianfeng, "Authentications and key management in 3G-WLAN interworking," in Proc. of Mobile Network & Applications, vol. 16, no. 3, pp. 394-407, 2011. DOI ScienceOn |
49 | Au. Yoris. A and Kauffman. Robert. J, "The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application," in Proc. of Electronic Commerce Research and Applications, vol. 7, no. 2, pp. 141-164, 2008. |
50 | Stamatis. Karnouskos, Anna. Hondroudaki, András. Vilmos and Balázs. Csik, "Security, trust and privacy in the secure mobile payment service," in Proc. of 3rd International Conference on Mobile Business, 2004. |
51 | Karnouskos. S and Vilmos. A, "The european perspective on mobile payments," in Proc. of Joinst IST Workshop on Mobile Future & Symposium of Trends in Communications, pp. 185-198, 2004. |
52 | Leavitt. Neal, "Payment applications make e-commerce mobile," in Proc. IEEE of Computer, vol. 43, no. 12, pp. 19-22, 2010. |
53 | Gu. Ruijun, Yao. Juan and Wang. Jiacai, "Research on mobile payment technology and business models in China under e-commerce environment," in Proc. of Future Generation Information Technology, vol. 6485, pp. 334-343, 2010. |
54 | X.Y. Zhou and J.M. Schoenung, "An integrated impact assessment and weighting methodology: Evaluation of the environmental consequences of computer display technology substitution," in Proc. of Journal of Environmental Management, vol. 83, no. 1, pp. 1-24, 2007. |