Iphone 4G

Secure mobile commerce

Mobile commerce has become very popular in recent years. It is one more way performing commercial transactions which is developing. Its security is of a great importance to its users.


Mobile Commerce, also known as M-Commerce or mCommerce, is the ability to conduct commerce using a mobile device, such as a mobile phone, a Personal Digital Assistant (PDA), a smartphone, or other emerging mobile equipment such as dashtop mobile devices. Mobile Commerce has been defined as follows:
“Mobile Commerce is any transaction, involving the transfer of ownership or rights to use goods and services, which is initiated and/or completed by using mobile access to computer-mediated networks with the help of an electronic device.” [1]

M-commerce, or mobile commerce, is a major application domain for mobile devices, enabling users to perform commercial transactions wherever they go. However, these applications require a high level of security. In this paper, the special characteristics of m-commerce are identified and some important security issues considered. [2]

It is expected that mobile agent will be widely used for electronic commerce as an important key technology. If a mobile agent can sign a message in a remote server on behalf of a customer without exposing his/her private key, it can be used not only to search for special products or services, but also to make a contract with a remote server. To construct mobile agents, [[KBC00]] used an RSA-based undetachable signature scheme, but it does not provide server’s non-repudiation because the undetachable signature does not contain server’s signature. Mobile agent is a very good application example of proxy signature, and the undetachable signature can be considered as an example of proxy signature. In this paper we show that secure mobile agent can be constructed using strong non-designated proxy signature [[LKK01]] which represents both the original signer’s (customer) and the proxy signer’s (remote server) signatures. We provide RSA-based and Schnorr-based constructions of secure mobile agent, and moreover we show that the Schnorr-based scheme can be used very efficiently in multi-proxy mobile agent situation. [3]

E-commerce has become a huge business and a driving factor in the development of the Internet. Online shopping services are well established and will, with the advent of evolved 2G and 3G mobile networks, soon be complemented by their wireless counterparts. Furthermore, online delivery of digital media, such as MP3 audio or video, is very popular today and will become an increasingly important part of e-commerce and mobile e-commerce (m-commerce). However, a major obstacle for digital media distribution and associated business is the possibility of unlimited consecutive copying in the digital domain, which threatens intellectual property rights (e.g., copyrights). Digital rights management systems are required to protect rights and business. DRM systems typically incorporate encryption, conditional access, copy control mechanisms, and media identification and tracing mechanisms. Watermarking is the technology used for copy control and media identification and tracing. Most proposed watermarking methods use a so-called spread spectrum approach: a pseudo-noise signal with small amplitude is added to the host signal, and later on detected using correlation methods. A secret key is used to ensure that the watermark can only be detected and removed by authorized parties. Thus, watermarking is an essential component of modern DRM systems. Several standardization bodies are involved in DRM standardization. Some examples, (MPEG-4, SDMI, and DVD), are discussed in this article. Watermarking as an enabling technology is especially highlighted. Furthermore, the relation between DRM and m-commerce, and the impact on business models for m-commerce are discussed. A common experience today is that Internet e-commerce applications cannot always easily be adapted for mobile telecommunications systems. We emphasize, however, that DRM and watermarking can benefit from the additional information available in mobile telecommunications systems, and can thus help to improve rights management for digital media delivery. [4]

Mobile payment is the process of two parties exchanging financial value using a mobile device in return for goods or services. This paper is an analysis of the security issues in mobile payment for m-commerce. We introduce m-commerce and mobile payment, discuss the public key infrastructure as a basis for secure mobile technologies, and study the features for different security technologies employed in current m-commerce market, including WAP, SIM application toolkit and J2M. In addition, we compare the effectiveness of these security technologies in supporting a secure mobile payment, and discuss research issues to enhance the security of mobile payment for large scale deployment of m-commerce. [5]

Advances in e-commerce have resulted in significant progress towards strategies, requirements, and development of e-commerce applications. However, nearly all e-commerce applications envisioned and developed so far assume fixed or stationary users with wired infrastructure. We envision many new e-commerce applications that will be possible and significantly benefit from emerging wireless and mobile networks. To allow designers, developers, and researchers to strategize and create mobile commerce applications, we propose a four-level integrated framework for mobile commerce. Since there are potentially an unlimited number of mobile commerce applications, we attempt to identify several important classes of applications such as mobile financial applications, mobile inventory management, proactive service management, product location and search, and wireless re-engineering. We discuss how to successfully define, architect, and implement the necessary hardware/software infrastructure in support of mobile commerce. Also, to make mobile commerce applications a reality, we address networking requirements, discuss support from wireless carriers, and present some open research problems. [6]


Security of mobile commerce is of the greatest importance to its user and developers have the task to bring it to the highest level. Since mobile commerce is used more and more each day that will happen soon.


[1] http://en.wikipedia.org/wiki/Mobile_commerce
[2] ”Secure mobile commerce” by: Schwiderski-Grosche, S.; Knospe, H.
[3] ”Secure Mobile Agent Using Strong Non-designated Proxy Signature” by: Byoungcheon Lee, Heesun Kim and Kwangjo Kim
[4] ”Digital rights management and watermarking of multimedia content for m-commerce applications”
[5] “Analysis of payment transaction security in mobile commerce” by: Seema Nambiar; Lu, C.-T.; Liang, L.R.
[6] “Mobile commerce: framework, applications and networking support” by: Upkar Varshney, Ron Vetter


AUTHOR: Josip Ivanovic


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>