Skip to main content

Security and Privacy Issues in Agent-Based Location-Aware Mobile Commerce

  • Conference paper
Safety and Security in Multiagent Systems

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4324))

Abstract

Mobile commerce and location-aware services promise to combine the conveniences of both online and offline bricks-and-mortar services. Just as agent-enabled desktop computers can be used to improve a user’s e-commerce experience, so can agent-enabled mobile devices be used to improve a user’s mobile commerce experience. Agent-enabled mobile devices can perform complex and time-consuming tasks not well-suited for the small and cumbersome user interfaces available on most mobile devices, can interact with other mobile devices over more than one interface, and can accompany users under circumstances in which the desktop computers cannot. Agent-enabled mobile devices, however, present new security challenges and risks. While e-commerce agents run the risk of disclosing one’s identity in cyberspace, agent-enabled mobile devices running location-aware applications, run the risk of disclosing one’s actual physical location in addition to other personal information. This paper outlines security and privacy issues and provides security guidelines for agent-based location-aware mobile commerce.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gritzalis, D., Kyrloglou, N.: Consumer Online-Privacy and Anonymity Protection using Infomediary Schemes. In: Computer Science Society, 2001, SCCC 2001 Proceedings, XXI Internatinal Conference of the Chilean, November 7-9 (2001)

    Google Scholar 

  2. Geissler, T., Berlin, O.: Applying Security Standards to Multi Agent Systems. In: W21 Safety & Security in Multiagent Systems held at AAMAS 2004 (2004)

    Google Scholar 

  3. Patrick, A.S.: Building Trustworthy Software Agents. IEEE Internet Computing (November-December 2002), NRC 44958

    Google Scholar 

  4. Padovan, B., Sackmann, S., Eymann, T., Pippow, I.: A Prototype for an Agent-based Secure Electronic Marketplace including Reputation Tracking Mechanisms. In: 2001 Proceedings of the 34th Annual Hawaii International Conference on System Sciences, January 3-6 (2001)

    Google Scholar 

  5. Younas, M., Chao, K.M., Anane, R.: M-Commerce Transaction Management with Multi-Agent Support, Advanced Information Networking and Applications. In: 17th International Conference on Advanced Information Networking and Applications, AINA 2003, March 27-29 (2003)

    Google Scholar 

  6. Soriano, M., Ponce, D.: A Security and Usability Proposal for Mobile Electronic Commerce. IEEE Communications Magazine 40(8) (August 2002)

    Google Scholar 

  7. Park, N.J., Song, Y.J.: M-Commerce Security Platform based on WTLS and J2ME. In: IEEE International Symposium on Industrial Electronics, Proceedings ISIE 2001, June 12-16, vol. 3 (2001)

    Google Scholar 

  8. Ahluwalia, P., Varshney, U.: A Link and Network Layer Approach to Support Mobile Commerce Transactions. In: IEEE 58th Vehicular Technology Conference, VTC 2003-Fall 2003 , October 6-9, vol. 5 (2003)

    Google Scholar 

  9. Grosche, S.S., Knospe, H.: Secure mobile commerce. Electronics & Communication Engineering Journal 14(5) (October 2002)

    Google Scholar 

  10. Li, X., Kou, W.: A Secure M-Commerce Model Based On Wireless Local Area Network. In: 18th International Conference on Advanced Information Networking and Applications, 2004, AINA 2004, March 29-31, vol. 2 (2004)

    Google Scholar 

  11. Wang, Y.H., Wang, C.A., Chiang, J.S., Lo, W.H.: Tamsui: A Secure Model in Agent-Based Marketplace. In: 17th International Conference on Advanced Information Networking and Applications (AINA 2003), Xian, China, March 27-29 (2003)

    Google Scholar 

  12. Laclavik, M., Hluchy, L.: Secure inter-agent negotiation and communication. In: ICETA 2001.International Conference on Emerging Telecommunications Technologies and Applications - Kosice ELFA (2001)

    Google Scholar 

  13. Bergenti, F., Poggi, A., Burg, B., Caire, G.: Deploying FIPA-compliant systems on mobile devices. IEEE Internet Computing 5(4) (July-August 2001)

    Google Scholar 

  14. Datasheet Security Trust Services APIs For the Java 2 Platform, Micro Edition: Security and Trust Services APIs For the Java 2 Platform, Micro Edition (January 2005), https://sdc.sun.com/kiosk/ViewPDF?pdf_id=IG820GGABO

  15. Gavrila, S., Iorga, M., Jansen, W., Karygiannis, A., Korolev, V.: Security Policy Management for Handheld Devices. In: The 2003 International Conference on Security and Management, Las Vegas, Nevada, June 23-26 (2003)

    Google Scholar 

  16. Borselius, N.: Security in multi-agent systems. In: Proceedings of the 2002 International Conference on Security and Management (SAM 2002). Las Vegas, Nevada, June 2002, CSREA Press (2002)

    Google Scholar 

  17. Hristova, N., O’Hare, G.M.P.: Ad-me: wireless advertising adapted to the user location, device and emotions. In: 2004 Proceedings of the 37th Annual Hawaii International Conference on System Sciences, January 5-8 (2004)

    Google Scholar 

  18. Hattangady, S., Davis, C.: Reducing the Security Threats to 2.5G and 3G Wireless Applications. White Paper SWPY003 (January 2002)

    Google Scholar 

  19. Chari, S., Kermani, P., Smith, S.W., Tassiulas, L.: Security Issues in M-Commerce: A Usage-Based Taxonomy. In: Liu, J., Ye, Y. (eds.) E-Commerce Agents. LNCS (LNAI), vol. 2033, pp. 264–283. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  20. Ahonen, J.: PDA OS Security: Application Execution. Telecommunications Software and Multimedia TML-C7 ISSn 145597

    Google Scholar 

  21. Spinellis, D., Moulinos, K., Iliadis, J., Gritzalis, D., Gritzalis, S., Katsikas, S.: Deploying a Secure Cyberbazaar by adding Trust on Commercial Transactions. eJETA: The eJournal for Electronic Commerce Tools and Applications 1(2) (November 2002)

    Google Scholar 

  22. Nokia Developer’s Suites for J2METM and PersonalJavaTM, Location API for J2METM, JSR-179 (January 2005), http://www.forum.nokia.com/files/nds_disclaimer/1,6673,3551,00.html

  23. Labrou, Y., Agre, J., Ji, L., Molina, J., Chen, W.L.: Wireless Wallet. In: Proceedings of the 1st International Conference on Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous 2004), Boston, Massachusetts, USA, August 22-25 (2004)

    Google Scholar 

  24. Owens, L., Karygiannis, A.: NIST Special Publication on Wireless Network Security: 802.11, Bluetooth, and Handheld Devices, SP 800-48 (October 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karygiannis, A., Antonakakis, E. (2009). Security and Privacy Issues in Agent-Based Location-Aware Mobile Commerce. In: Barley, M., Mouratidis, H., Unruh, A., Spears, D., Scerri, P., Massacci, F. (eds) Safety and Security in Multiagent Systems. Lecture Notes in Computer Science(), vol 4324. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04879-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04879-1_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04878-4

  • Online ISBN: 978-3-642-04879-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics