Abstract
We are now entering the mobile/wireless era. The key message of this era appears to be “anywhere–anytime” communication and transferring of data or information. While this sounds very simple, many technological considerations need to be examined in order to actualize such a message. Integral to enabling “anywhere–anytime” communication and transmission of data and information is a sound secure system. Hence a robust trust model in any mobile transaction becomes significant. This paper discusses the issue of such a trust model and outlines its key components.
Similar content being viewed by others
References
Alevras, D., M. Grotschel, P. Jonas, U. Paul, and R. Wessaly. (1998). "Survivable Mobile Phone Network Architectures: Models and Solution Methods." IEEE Communications Magazine 36, 88–93.
Arbaugh, W., N. Shankar, and Y. Wan (2001). "Your 802.11 Wireless Network Has no Clothes." University of Maryland Report, March 30, 2001. http://www.cs.umd.edu/~waa/wireless.pdf
Austin, T. (March 2001). "Acquiring PKI." Information Security Magazine, http://www. infosecuritymag.com/articles/march01/features3_pki.shtml
Borisov, N., I. Goldberg, and D. Wagner (2001). "Intercepting Mobile Communications: The Insecurity of 802.11." In 7th Annual Internat. Conf. Mobile Computing and Networking 2001, July 16-21, 2001, Rome, Italy. http://www.acm.org/sigmobile
Brookson, C. (December 2001). "GPRS Security." http://www.brookson.com/gsm/contents.htm
Brookson, C. "GSM (and PCN) Security and Encryption." http://www.brookson.com/gsm/ contents.htm
Ericsson. (September 2001). "The TDMA Operator Path to GSM: A Successful Transition to GSM and Evolution of TDMA." AWhite Paper. http://www.gsmworld.com/technology/index.shtml
Gartner Group Strategic. (2001). "Wireless Application Gateways: An Emerging Technology (an Update)." Analysis Report, 23 October, 2001.
GSM Cloning. http://www.isaac.cs.berkeley.edu/isaac/gsm.html
GSM World. Wireless Subscriber Statistics. http://www.gsmworld.com/news/statistics/ substats.shtml
Jakobsson, M. and S. Wetzel. (2001). "Security Weaknesses in Bluetooth." In RSA Conference'01, April 8-12, 2001.
Kalakota, R. and M. Robinson. (2001). M-Business: the Race to Mobility. New York: McGraw-Hill.
Muller, T. (1999). "Bluetooth Security Architecture Version 1.0." BSIG White Paper, July 15, 1999, p. 8. http://citeseer.nj.nec.com/context/1083381/0
Mynttinen, J. (2000). "End-to-End Security of Mobile Data in GSM." Helsinki University of Technology, November 27, 2000. http://www.hut.fi/~jmynttin/netsec/paper.pdf
Pahlavan, K., P. Krishnamurthy, and A. Hatami (2000). "Handoff in Hybrid Mobile Data Networks." IEEE Personal Communications Magazine 7(2), 34–47.
Stallings, W. (1999). Cryptography and Network Security: Principles and Practice. New York: Prentice Hall.
Stallings, W. (2002). Wireless Communications and Networks. New York: Prentice Hall.
Tamzin, J. (2001). "Wireless Application Protocol 2.0 Security." November 29, 2001. http://rr.sans.org/wireless/WAP2_sec.php
The 3rd Generation Partnership Project (3GPP). UMTS Security Specification TT 33.102. http://www.3gpp.org
The Wireless Net. (2002). "Wi-Fi: It's Fast, It's Here-and It Works." Special Report: The Wireless Net. Business Week, April 1, 2002. http://www.businessweek.com/technology/content/ apr2002/tc2002041_1823.htm
Walker Report. http://www.dis.org/wl/pdf/unsafe.pdf
Wapforum. Wireless Application Protocol. http://www.wapforum.org
WIDCOMM Inc. "Bluetooth Security Solutions: Resolution to the Technical Security Complexities of the Wirelessly Connected." San Diego, CA. http://www.widcomm.com/bluetooth/pdfs/ BluetoothSecurityWP.pdf
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Misra, S.K., Wickamasinghe, N. Security of a Mobile Transaction: A Trust Model. Electronic Commerce Research 4, 359–372 (2004). https://doi.org/10.1023/B:ELEC.0000037082.39182.3a
Issue Date:
DOI: https://doi.org/10.1023/B:ELEC.0000037082.39182.3a