skip to main content
10.1145/1163673.1163695acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Ticket-based mobile commerce system and its implementation

Authors Info & Claims
Published:02 October 2006Publication History

ABSTRACT

Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very well in such environments. Mobile database access usually across multiple service domains, traditional access mechanisms rely on the concept of starting home location and cross domain authentication using roaming agreements. However, the cross domain authentications involve many complicated authentication activities when the roam path is long. This limits the future mobile applicationsThis paper presents a solution for all kinds of mobile services through short message service (SMS) systems and a ticket-based service access model that allows anonymous service usage in mobile applications. A service provider can avoid roaming to multiple service domains, only contacting the Credential Centre in the model to check a user's certification. The user can preserve anonymity and read a clear record of charges in the Credential Centre at anytime, and the identity of misbehaving users can be revealed by a Trusted Centre. Furthermore, the solution has been demonstrated by the implementation with SMS and RS232

References

  1. D. Box. Simple Object Access Protocol (SOAP) 1.1. World Wide Web Consortium (W3C), Cambridge, MA, USA, 2000.Google ScholarGoogle Scholar
  2. L. Buttyan and J. Hubaux. Accountable anonymous access to services in mobile communication systems. In Symposium on Reliable Distributed Systems, pages 384--389, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Chinnici, M. Gudgin, J. Moreau, and S. Weerawarana. Web Services Description Language (WSDL) 1.2. World Wide Web Consortium (W3C), Cambridge, MA, USA, 2002.Google ScholarGoogle Scholar
  4. F. Gandon and N. Sadeh. "semantic web technologies to reconcile privacy and context awareness". Web Semantics Journal, 1(3), 2004.Google ScholarGoogle ScholarCross RefCross Ref
  5. A. Lubinski and A. Heuer. Configured replication for mobile applications. Rostocker informatik berichte, 24:101--112, 2000.Google ScholarGoogle Scholar
  6. A. Mehrotra. GSM System Engineering. Norwood, Artech House, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Mehrotra and L. Golding. Mobility and security management in the gsm system and some proposed future improvements. IEEE, 86(7), 1998.Google ScholarGoogle Scholar
  8. B. Pratel and J. Crowcroft. Ticket based service access for the mobile user. In Proceedings of MobiCom: International Conference on Mobile Computing and Networking, pages 223--232, Budapest, Hungary, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. N. M. Sadeh. m-Commerce: Technologies, Services and Business Models. Wiley, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H. Wang, J. Cao, and K. Yahico. Building a consumer anonymity scalable payment protocol for the internet purchases. In The 12th International Workshop on Research Issues on Data Engineering: Engineering E-Commerce/E-Business Systems, pages 159--168, San Jose, USA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. H. Wang, J. Cao, and Y. Zhang. An electronic payment scheme and its rbac management. Concurrent Engineering: Research and Application Journal, 12(3):247--257, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  12. H. Wang, J. Cao, and Y. Zhang. A flexible payment scheme and its role based access control. IEEE Transactions on Knowledge and Data Engineering, 17(3):425--436, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Wang and Y. Zhang. Untraceable off-line electronic cash flow in e-commerce. In The 24th Australian computer science conference, pages 191--198, GoldCoast, Australia, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Wang, Y. Zhang, J. Cao, and V. Varadharajan. Achieving secure and flexible m-services through tickets. IEEE Transactions on Systems, Man, and Cybernetics, Part A, Special issue on M-Services, 33:697--708, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. U. Wilhelm, S. Staamann, and L. Buttyan. On the problem of trust in mobile agent systems. In IEEE Network and Distributed Systems Security Symposium, pages 11--13, San Diego, CA, 1999.Google ScholarGoogle Scholar

Index Terms

  1. Ticket-based mobile commerce system and its implementation

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          Q2SWinet '06: Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
          October 2006
          146 pages
          ISBN:1595934863
          DOI:10.1145/1163673

          Copyright © 2006 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 October 2006

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate46of131submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader