Skip to main content
Log in

Security of a Mobile Transaction: A Trust Model

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

We are now entering the mobile/wireless era. The key message of this era appears to be “anywhere–anytime” communication and transferring of data or information. While this sounds very simple, many technological considerations need to be examined in order to actualize such a message. Integral to enabling “anywhere–anytime” communication and transmission of data and information is a sound secure system. Hence a robust trust model in any mobile transaction becomes significant. This paper discusses the issue of such a trust model and outlines its key components.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Alevras, D., M. Grotschel, P. Jonas, U. Paul, and R. Wessaly. (1998). "Survivable Mobile Phone Network Architectures: Models and Solution Methods." IEEE Communications Magazine 36, 88–93.

    Article  Google Scholar 

  2. Arbaugh, W., N. Shankar, and Y. Wan (2001). "Your 802.11 Wireless Network Has no Clothes." University of Maryland Report, March 30, 2001. http://www.cs.umd.edu/~waa/wireless.pdf

  3. Austin, T. (March 2001). "Acquiring PKI." Information Security Magazine, http://www. infosecuritymag.com/articles/march01/features3_pki.shtml

  4. Borisov, N., I. Goldberg, and D. Wagner (2001). "Intercepting Mobile Communications: The Insecurity of 802.11." In 7th Annual Internat. Conf. Mobile Computing and Networking 2001, July 16-21, 2001, Rome, Italy. http://www.acm.org/sigmobile

  5. Brookson, C. (December 2001). "GPRS Security." http://www.brookson.com/gsm/contents.htm

  6. Brookson, C. "GSM (and PCN) Security and Encryption." http://www.brookson.com/gsm/ contents.htm

  7. Ericsson. (September 2001). "The TDMA Operator Path to GSM: A Successful Transition to GSM and Evolution of TDMA." AWhite Paper. http://www.gsmworld.com/technology/index.shtml

  8. Gartner Group Strategic. (2001). "Wireless Application Gateways: An Emerging Technology (an Update)." Analysis Report, 23 October, 2001.

  9. GSM Cloning. http://www.isaac.cs.berkeley.edu/isaac/gsm.html

  10. GSM World. Wireless Subscriber Statistics. http://www.gsmworld.com/news/statistics/ substats.shtml

  11. Jakobsson, M. and S. Wetzel. (2001). "Security Weaknesses in Bluetooth." In RSA Conference'01, April 8-12, 2001.

  12. Kalakota, R. and M. Robinson. (2001). M-Business: the Race to Mobility. New York: McGraw-Hill.

    Google Scholar 

  13. Muller, T. (1999). "Bluetooth Security Architecture Version 1.0." BSIG White Paper, July 15, 1999, p. 8. http://citeseer.nj.nec.com/context/1083381/0

  14. Mynttinen, J. (2000). "End-to-End Security of Mobile Data in GSM." Helsinki University of Technology, November 27, 2000. http://www.hut.fi/~jmynttin/netsec/paper.pdf

  15. Pahlavan, K., P. Krishnamurthy, and A. Hatami (2000). "Handoff in Hybrid Mobile Data Networks." IEEE Personal Communications Magazine 7(2), 34–47.

    Article  Google Scholar 

  16. Stallings, W. (1999). Cryptography and Network Security: Principles and Practice. New York: Prentice Hall.

    Google Scholar 

  17. Stallings, W. (2002). Wireless Communications and Networks. New York: Prentice Hall.

    Google Scholar 

  18. Tamzin, J. (2001). "Wireless Application Protocol 2.0 Security." November 29, 2001. http://rr.sans.org/wireless/WAP2_sec.php

  19. The 3rd Generation Partnership Project (3GPP). UMTS Security Specification TT 33.102. http://www.3gpp.org

  20. The Wireless Net. (2002). "Wi-Fi: It's Fast, It's Here-and It Works." Special Report: The Wireless Net. Business Week, April 1, 2002. http://www.businessweek.com/technology/content/ apr2002/tc2002041_1823.htm

  21. Walker Report. http://www.dis.org/wl/pdf/unsafe.pdf

  22. Wapforum. Wireless Application Protocol. http://www.wapforum.org

  23. WIDCOMM Inc. "Bluetooth Security Solutions: Resolution to the Technical Security Complexities of the Wirelessly Connected." San Diego, CA. http://www.widcomm.com/bluetooth/pdfs/ BluetoothSecurityWP.pdf

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Misra, S.K., Wickamasinghe, N. Security of a Mobile Transaction: A Trust Model. Electronic Commerce Research 4, 359–372 (2004). https://doi.org/10.1023/B:ELEC.0000037082.39182.3a

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:ELEC.0000037082.39182.3a

Navigation