M-Identity and its authentication protocol for secure mobile commerce applications

  • Authors:
  • Fengling Han;Ron van Schyndel

  • Affiliations:
  • School of Computer Science and Information Technology, RMIT University, Melbourne, VIC, Australia;School of Computer Science and Information Technology, RMIT University, Melbourne, VIC, Australia

  • Venue:
  • CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Mobile commerce (m-commerce) delivers value-added services to customers and creates new market opportunities. However, establishing a secure m-commerce platform that offers high level of service can be challenging. This paper proposes a concept of m-identity targeted at control the access of involved parties in an m-commerce transaction. M-identity includes both identities of a user and his/her bound mobile device which is defined as a user's biometric feature(s) taken by his/her bound mobile camera. As an additional factor of authentication, a watermark is embedded in the captured biometric images. The embedding key of the watermark is a shared secret between mobile device and central server. Then an m-identity authentication (MA) protocol is proposed. M-identity merges mobile device identity into biometrics images. Only the genuine owner whose biometric information captured by his/her bound mobile device can pass m-identity authentication. Combined with the watermark, this makes a 2 ½ factor authentication process. Fingerprint biometrics taken with the mobile camera is used as an example to show how MA protocol works.