• DocumentCode
    2722704
  • Title

    Enhanced Mobile SET Protocol with Formal Verification

  • Author

    Ahamad, Shaik Shakeel ; Sastry, N.N. ; Udgata, Siba K.

  • Author_Institution
    Inst. for Dev. & Res. in Banking Technol. (IDRBT), Hyderabad, India
  • fYear
    2012
  • fDate
    23-25 Nov. 2012
  • Firstpage
    288
  • Lastpage
    293
  • Abstract
    In this paper we propose an Enhanced Mobile SET (EMSET) protocol with formal verification using Mobile Agent technology and Digital Signature with Message Recovery based on ECDSA mechanism. Mobile Agent technology and Digital Signature with Message Recovery (DSMR) based on ECDSA mechanism provides in proposing EMSET protocol in Mobile Networks. Mobile Agent technology has many benefits such as bandwidth conservation, reduction of latency, reduction of completion time, Asynchronous (disconnected) communications. Digital Signature with Message Recovery based on ECDSA eliminates the need of adopting PKI cryptosystems. Our proposed protocol EMSET ensures Authentication, Integrity, Confidentiality and Non Repudiation, achieves Identity protection from merchant and Eavesdropper, achieves Transaction privacy from Eavesdropper and Payment Gateway, achieves Payment Secrecy, Order Secrecy, forward secrecy, and prevents Double Spending, Overspending and Money laundering. In addition to these our proposed protocol withstands Replay, Man in the Middle and Impersonation attacks. The security properties of the proposed protocol have been verified using Scyther Tool and presented with results.
  • Keywords
    credit transactions; cryptographic protocols; data integrity; data privacy; digital signatures; formal verification; internetworking; mobile agents; mobile computing; public key cryptography; radio networks; ECDSA mechanism; EMSET protocol; Scyther tool; asynchronous communications; authentication; bandwidth conservation; completion time reduction; confidentiality; data integrity; digital signature with message recovery; double spending; eavesdropper; enhanced mobile SET protocol; formal verification; forward secrecy; identity protection; impersonation attacks; latency reduction; man in the middle attacks; merchant; mobile agent technology; mobile networks; money laundering; nonrepudiation; order secrecy; overspending; payment gateway; payment secrecy; transaction privacy; Cryptography; Digital signatures; Logic gates; Mobile agents; Mobile communication; Privacy; Protocols; Digital Signature with Message Recovery (DSMR) Money laundering; Double Spending; EMSET; Mobile agents; Overspending and Scyther Tool;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer and Communication Technology (ICCCT), 2012 Third International Conference on
  • Conference_Location
    Allahabad
  • Print_ISBN
    978-1-4673-3149-4
  • Type

    conf

  • DOI
    10.1109/ICCCT.2012.65
  • Filename
    6394714