ZHU Xiaomin, SHANG Xiaopu, WANG Chuanchen, et al., “MOTP: An Identity Authentication Scheme for M-Commerce,” Chinese Journal of Electronics, vol. 22, no. 1, pp. 146-150, 2013,
Citation: ZHU Xiaomin, SHANG Xiaopu, WANG Chuanchen, et al., “MOTP: An Identity Authentication Scheme for M-Commerce,” Chinese Journal of Electronics, vol. 22, no. 1, pp. 146-150, 2013,

MOTP: An Identity Authentication Scheme for M-Commerce

Funds:  This work is supported by the National Natural Science Foundation of China (No.71132008), Beijing Natural Science Foundation (No.4112044), the Fundamental Research Funds for Central Universities of China (No.2011JBM365, No.2011YJS226) and Beijing Municipal Science and Technology Commission (No.Z111100000111010).
  • Received Date: 2012-03-01
  • Rev Recd Date: 2012-04-01
  • Publish Date: 2013-01-05
  • With the development of E-commerce and mobile communication technology, Mobile E-commerce (M-commerce) has become one of the important means of trade. Identity authentication is the basic security issue in M-commerce. In this paper, an efficient Elliptic curve based One-time password (OTP) identity authentication scheme (MOTP) for M-commerce is proposed, also, International mobile equipment identity (IMEI) of mobile devices is introduced as an important authentication factors. At the end, this paper analyzes the novel scheme by BAN logic and does simulation in OPNET.
  • loading
  • Yu Zheng, Dake He and Mingxing He, “An authenticationscheme in mobile terminal users based on trusted computation”,Chinese Journal of Computers, Vol.29, No.8, pp.1255-1264, 2006.
    Mu Yang, Runtong Zhang and Yi Yang, “New OTP authenticationscheme for m-commerce based on one time password”,Computer Security, Vol.28, No.B06, pp.71-72, 75, 2008.
    Chao Li, Yang Xin, Xinxin Niu, “Identity authenticationscheme based on biometric certificate”, Computer Engineering,Vol.33, No.20, pp.159-161, 2007.
    L. Fan, C.X. Xu, J.H. Li, “User authentication scheme usingsmart cards for multi-server environments”, Chinese Journal ofElectronics, Vol.15, No.1, pp.79-84, 2006.
    Ji Dongyao, Wang Yumin, “An Authentication and MicropaymentProtocol for Mobile Computing Network”, Acta ElectronicaSinica, Vol.30, No.4, pp.495-498, 2002. (in Chinese)150 Chinese Journal of Electronics 2013
    Ping Han, Yanqin Zhu, Xizhao Luo, “Identity authenticationscheme using OTP in wireless LAN”, Computer Engineering,Vol.34, No.14, pp.161-162, 165, 2008.
    Tianfa Liu, Qiyuan Feng, Guiyong Yang, “Reserch of authenticationtechnique based on OTP”, Computer Applications andSoftware, Vol.8, No.8, pp.177-179, 206, 2007.
    L. Lamport, “Password authentication with insecure communication”,Communication of ACM, Vol.24, No.11, pp.770-772,1981.
    Chunli Lin, Chingpo Hung, “Masquerade on one-time passwordauthentication scheme”, Future Generation Communicationand Networking, Vol.2, pp.683-689, 2007.
    Hesheng Wu, Xunli Fan, Weimin Wu, “An efficient one-timepassword authentication”, Application Research of Computers,Vol.20, No.8, pp.57-59, 2003.
    T.H. Chert, W.B. Lee, G. Horng, “Secure SAS-like passwordauthentication schemes”, Computer Standards and Interfaces,Vol.27, No.1, pp.25-31, 2004.
    G. Horn, K.M. Martin, C.J. Mitchell, “Authentication protocolsfor mobile network environment value-added services”, IEEETransaction on Vehicular Technology, Vol.51, No.2, pp.383-392, 2002.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (719) PDF downloads(1561) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return