Mobile commerce: framework, applications and networking support
Mobile Networks and Applications
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Computer Security and Cryptography
Computer Security and Cryptography
Attacking elliptic curve cryptosystems with special-purpose hardware
Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays
A new mobile payment scheme for roaming services
Electronic Commerce Research and Applications
A Practical Electronic Payment System for Message Delivery Service in the Mobile Environment
Wireless Personal Communications: An International Journal
A survey on clustering algorithms for wireless sensor networks
Computer Communications
The security challenges for mobile ubiquitous services
Information Security Tech. Report
Past, present and future of mobile payments research: A literature review
Electronic Commerce Research and Applications
Utilizing national public-key infrastructure in mobile payment systems
Electronic Commerce Research and Applications
An open financial services architecture based on the use of intelligent mobile devices
Electronic Commerce Research and Applications
A middleware framework for managing transactions in group-oriented mobile commerce services
Decision Support Systems
A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
On the Security of Route Discovery in MANETs
IEEE Transactions on Mobile Computing
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Energy comparison of AES and SHA-1 for ubiquitous computing
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A survey of clustering schemes for mobile ad hoc networks
IEEE Communications Surveys & Tutorials
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
IEEE Wireless Communications
Detecting and avoiding wormhole attacks in wireless ad hoc networks
IEEE Communications Magazine
Hi-index | 0.00 |
A number of studies have made progress towards satisfying the vital security requirements of mobile commerce, including identifying and resolving most of the possible flaws. However, recent studies have asserted that a particular attack, called the wormhole attack, can seriously impair the routing protocol. This vulnerability exists in a wireless system and may also exist in ad hoc commerce systems. Although many attempts have been made to confront wormhole attacks in the field of wireless communications, the available solutions are still inadequate and need to be improved. For example, Ariadne-based methods have been confronted with the new insider attacks, but to date the vulnerability has not been fixed. Moreover, those solutions are not tailor-made for a mobile commerce environment. This paper identifies a possible new threat from wormhole attacks in an ad hoc mobile commerce environment and proposes an approach for handling this type of attacks in a way that is not impacted by the new problems facing Ariadne and endairA. Based on cryptographic theory, the proposed method that we discuss can nullify wormhole attacks coming from both the outside involving non-authorized and non-authenticated identities, and the inside for authorized and authenticated identities. The main features of our solution are: (1) in the routing request process, heavy computation can be parallelized among powerful servers; and (2) in the routing reply process, not every source node decrypts all the ciphertext transmitted by intermediate nodes and not every intermediate node needs to execute cryptographic computations. Through theoretical analysis, our approach is shown to be suitable for the mobile commerce environment, and more efficient and robust than Ariadne.