ENHANCING THE SECURITY OF MOBILE E-COMMERCE WITH A HYBRID BIOMETRIC AUTHENTICATION SYSTEM

Rachid Bencheikh, Luminita Vasiu

2005

Abstract

Mobile devices and wireless technologies seem destined to make a large and continuing impact on our lives. Mobile devices especially have been widely used in the last few years, and recent developments in wireless technologies have provided some new solutions to connectivity problems. Wireless technologies provide a new channel for implementation of mobile payments systems, the potential of short-range wireless technologies in commercial markets is enormous. Furthermore, as the popularity of m-commerce increases, so does the need for protecting personal privacy and online data. Several user authentication schemes for mobile e-commerce are starting to be introduced. This paper discusses some single factor and hybrid authentication methods currently in use, or being planned, for e-commerce and m-commerce. It also suggests a hybrid three-factor authentication scheme for mobile commerce, especially for voice-based mobile commerce, that uses speech recognition and speaker verification technology. Some issues relevant to such a scheme are also discussed.

References

  1. Basu, A., Muylle, S., 2003. Authentication in e-commerce, Communications of the ACM archive, Volume 46 , Issue 12 (December 2003), Mobile computing opportunities and challenges, Pages: 159 - 166, ACM Press New York, NY, USA.
  2. Bolle, R. , Connell, J. and S. Pankanti, 2004. Guide to Biometrics, Springer Professional Computing Publishers, New York.
  3. CCIR - Center for Communication Interface Research, 2000. Large Scale Evaluation of Automatic Speaker Verification Technology, University of Edinburgh. URL: http://spotlight.ccir.ed.ac.uk/public_documents/techno logy_reports/Verifier_report.pdf
  4. Chen, J. J., Adams, C. , 2004. Short-range wireless technologies with mobile payments systems, Proceedings of the 6th international conference on Electronic commerce, Delft, The Netherlands, ACM International Conference Proceeding Series; Vol. 60. ACM Press New York, NY, USA.
  5. Corcoran, D., Sims, D., Hillhouse, B., 2002. Smartcards and Biometrics: Your Key to PKI, URL: http://www.biowebserver.com/downloads/Smartcards. pdf
  6. Fui-Hoon Nah, F., Siau, K., Sheng , H. , 2005. The value of mobile applications: a utility company study, Communications of the ACM, February 2005, Volume 48 Issue 2, ACM Press.
  7. GPayments, Ltd., 2002, Visa 3-D Secure vs. MasterCard SPA: A Comparison of Online Authentication Standards, URL: http://www.gpayments.com/pdfs/GPayments_3- D_vs_SPA_Whitepaper.pdf
  8. Pearce, D., 2000. Enabling New Speech Driven Services for Mobile Devices: An Overview of the ETSI Standards Activities for Distributed Speech Recognition Front Ends, AVIOS 2000, May 22-24, 2000, San Jose CA, URL: http://portal.etsi.org/stq/kta/DSR/Avios DSR paper.pdf
  9. Radicchio White Paper, 2002. Wireless PKI Opportunities, Version 1.00 URL: http://www.radicchio.org/downloads/smd_002.pdf
  10. Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S., 2004. Security in embedded systems: Design challenges. ACM Transactions on Embedded Computing Systems, Volume 3 , Issue 3 (August 2004) Pages: 461 - 491, ACM Press New York, NY, USA.
  11. Roussos, G. , Moussouri, T., 2004. Consumer perceptions of privacy, security and trust in ubiquitous commerce, Personal and Ubiquitous Computing Volume 8 , Issue 6 (November 2004) Pages: 416 - 429, Publisher Springer-Verlag London, UK.
  12. Schwiderski-Grosche S. and Knospe, H., 2002. Secure Mobile Commerce, In: C. Mitchell (editor): Special issue of the IEE Electronics and Communication Engineering, Journal on Security for Mobility, Volume 14 Number 5, pages 228-238, October 2002.
  13. Sharaf, M. A., Chrysanthis, P. K., 2004. On-demand data broadcasting for mobile decision making, Mobile Networks and Applications, Volume 9 , Issue 6 (December 2004) Pages: 703 - 714 2004. Publisher Kluwer.
  14. Shi, Y., Cao, L., Wang, X., 2004. A security scheme of electronic commerce for mobile agents uses undetachable digital signatures. Proceedings of the 3rd international conference on Information security, Pages: 242 - 243, ACM Press New York, NY, USA.
  15. Tarasewich, P., 2003. Designing mobile commerce applications, Mobile computing opportunities and challenges, Pages: 57 - 60. ACM Press New York, NY, USA.
  16. Varshney, P. K., 1997, Multisensor Data Fusion.
  17. IEE, pp 245-253, December 1997.
Download


Paper Citation


in Harvard Style

Bencheikh R. and Vasiu L. (2005). ENHANCING THE SECURITY OF MOBILE E-COMMERCE WITH A HYBRID BIOMETRIC AUTHENTICATION SYSTEM . In Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE, ISBN 972-8865-32-5, pages 247-253. DOI: 10.5220/0001423902470253


in Bibtex Style

@conference{icete05,
author={Rachid Bencheikh and Luminita Vasiu},
title={ENHANCING THE SECURITY OF MOBILE E-COMMERCE WITH A HYBRID BIOMETRIC AUTHENTICATION SYSTEM},
booktitle={Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,},
year={2005},
pages={247-253},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001423902470253},
isbn={972-8865-32-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on e-Business and Telecommunication Networks - Volume 1: ICETE,
TI - ENHANCING THE SECURITY OF MOBILE E-COMMERCE WITH A HYBRID BIOMETRIC AUTHENTICATION SYSTEM
SN - 972-8865-32-5
AU - Bencheikh R.
AU - Vasiu L.
PY - 2005
SP - 247
EP - 253
DO - 10.5220/0001423902470253