Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 322))

Abstract

Although the mobile commerce has wide prospect, it has to face with huge challenges because of potential security risks, privacy problems and efficiency due to its limitations of processing capability, and storage space and power supply in mobile terminal. The secure and efficient open PKI (Public Key Infrastructure) identity authentication scheme is one of the possible solutions in secure identity authentication of the mobile commerce. In this paper, we propose a novel secure and efficient mutual open PKI identity authentication scheme, named SEMOPIAS, to solve the problems of validity, one-time use of identification and unauthorized application system in open PKI identity authentication scheme. Analysis and evaluation are performed to demonstrate that the SEMOPIAS achieves stronger security and higher efficiency by simplifying the message format and optimizing the authentication processes. Especially, the advantages of the SEMOPIAS will be achieved more significantly when there are multiple clients or merchants participated in the scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hoepner P, Karnouskos S, Vilmos A, et a1. (2003) Secure mobile payment–architecture and business model of semops. European Institute for Research and Strategic summit, pp 1–8

    Google Scholar 

  2. Trchina E, Hassinen M, Hypponen K (2008) Utilizing national public-key infrastructure in mobile payment systems. Electron Commer Res Appl 7(20):214–231

    Google Scholar 

  3. Javier L, Mildrey C, JoséMaría S (2009) Secure multiparty payment with an intermediary entity. Comput Secur 28(50):289–300

    Google Scholar 

  4. Kungpisdan S (2009) Accountability in centralized payment environments. In: 9th international symposium on communications and information technology, pp 1022–1027

    Google Scholar 

  5. Lee CS, Chong C, Chua HN (2006) Towards flexible mobile payment via mediator-based service model. In: 8th international conference on electronic commerce, pp 295–301

    Google Scholar 

  6. Apostolopoulos T, Kousaridas A, Parissis G (2008) An open financial services architecture based on the use of intelligent mobile devices. Electron Commer Res Appl 7(2):232–246

    Article  Google Scholar 

  7. Pierre S, Lei YH, Quintero A (2009) Mobile services access and payment through reusable tickets. Computer Commun 32(4):602–610

    Article  Google Scholar 

  8. Li H, Fan K, Wang Y (2009) A new abuse-free fair electronic payment protocol. In: 5th international conference on information assurance and security, pp 633–636

    Google Scholar 

  9. Li H, Fan K, Wang Y (2012) Fairness electronic payment protocol. Int J Grid Util Comput 3(1):53–58

    Article  Google Scholar 

Download references

Acknowledgements

This work has been financially supported by the Xi’an Science and Technology Plan funded project (CXY1352WL30).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Yue, W. (2015). SEMOPIAS: A Novel Secure and Efficient Mutual Open PKI Identity Authentication Scheme for Mobile Commerce. In: Mu, J., Liang, Q., Wang, W., Zhang, B., Pi, Y. (eds) The Proceedings of the Third International Conference on Communications, Signal Processing, and Systems. Lecture Notes in Electrical Engineering, vol 322. Springer, Cham. https://doi.org/10.1007/978-3-319-08991-1_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08991-1_39

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08990-4

  • Online ISBN: 978-3-319-08991-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics