DocumentCode :
2722704
Title :
Enhanced Mobile SET Protocol with Formal Verification
Author :
Ahamad, Shaik Shakeel ; Sastry, N.N. ; Udgata, Siba K.
Author_Institution :
Inst. for Dev. & Res. in Banking Technol. (IDRBT), Hyderabad, India
fYear :
2012
fDate :
23-25 Nov. 2012
Firstpage :
288
Lastpage :
293
Abstract :
In this paper we propose an Enhanced Mobile SET (EMSET) protocol with formal verification using Mobile Agent technology and Digital Signature with Message Recovery based on ECDSA mechanism. Mobile Agent technology and Digital Signature with Message Recovery (DSMR) based on ECDSA mechanism provides in proposing EMSET protocol in Mobile Networks. Mobile Agent technology has many benefits such as bandwidth conservation, reduction of latency, reduction of completion time, Asynchronous (disconnected) communications. Digital Signature with Message Recovery based on ECDSA eliminates the need of adopting PKI cryptosystems. Our proposed protocol EMSET ensures Authentication, Integrity, Confidentiality and Non Repudiation, achieves Identity protection from merchant and Eavesdropper, achieves Transaction privacy from Eavesdropper and Payment Gateway, achieves Payment Secrecy, Order Secrecy, forward secrecy, and prevents Double Spending, Overspending and Money laundering. In addition to these our proposed protocol withstands Replay, Man in the Middle and Impersonation attacks. The security properties of the proposed protocol have been verified using Scyther Tool and presented with results.
Keywords :
credit transactions; cryptographic protocols; data integrity; data privacy; digital signatures; formal verification; internetworking; mobile agents; mobile computing; public key cryptography; radio networks; ECDSA mechanism; EMSET protocol; Scyther tool; asynchronous communications; authentication; bandwidth conservation; completion time reduction; confidentiality; data integrity; digital signature with message recovery; double spending; eavesdropper; enhanced mobile SET protocol; formal verification; forward secrecy; identity protection; impersonation attacks; latency reduction; man in the middle attacks; merchant; mobile agent technology; mobile networks; money laundering; nonrepudiation; order secrecy; overspending; payment gateway; payment secrecy; transaction privacy; Cryptography; Digital signatures; Logic gates; Mobile agents; Mobile communication; Privacy; Protocols; Digital Signature with Message Recovery (DSMR) Money laundering; Double Spending; EMSET; Mobile agents; Overspending and Scyther Tool;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Communication Technology (ICCCT), 2012 Third International Conference on
Conference_Location :
Allahabad
Print_ISBN :
978-1-4673-3149-4
Type :
conf
DOI :
10.1109/ICCCT.2012.65
Filename :
6394714
Link To Document :
بازگشت