THESIS
2001
xii, 74 leaves : ill. ; 30 cm
Abstract
Electronic commerce is gaining popularity in recent years. The high penetration rate of the mobile handset, evolving technology on handheld mobile devices and deployment of the public key infrastructure in many parts of the world have led to the development of electronic commerce on mobile devices. However, a PKI-based end-to-end secure and open infrastructure for supporting electronic transactions on mobile devices is still absent. This is hampering the public’s adoption of mobile commerce. The main challenge is the limited computing capacity on these devices for PKI operations which are CPU intensive and require much more memory space compared to symmetric key operations. This is especially true for the mobile phone in which the only accessible processor and memory are on the SIM card...[
Read more ]
Electronic commerce is gaining popularity in recent years. The high penetration rate of the mobile handset, evolving technology on handheld mobile devices and deployment of the public key infrastructure in many parts of the world have led to the development of electronic commerce on mobile devices. However, a PKI-based end-to-end secure and open infrastructure for supporting electronic transactions on mobile devices is still absent. This is hampering the public’s adoption of mobile commerce. The main challenge is the limited computing capacity on these devices for PKI operations which are CPU intensive and require much more memory space compared to symmetric key operations. This is especially true for the mobile phone in which the only accessible processor and memory are on the SIM card in GSM phones. In this thesis, we present a new architecture and protocols for authentication and key exchange as well as the supporting infrastructure that are suitable and optimised for the mobile phone environment. The system and security requirements and our solutions in addressing these requirements in the restrictive environment are discussed. An evaluation of the system performance is also included. The system has been implemented and is supporting some real-life applications.
Post a Comment