IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Multicast for Mobile Commerce Applications: Issues and Challenges

Secure Multicast for Mobile Commerce Applications: Issues and Challenges
View Sample PDF
Author(s): Mohamed Eltoweissy (Virginia Tech, USA), Sushil Jajodia (George Mason University, USA)and Ravi Mukkamala (Old Dominion University, USA)
Copyright: 2008
Pages: 22
Source title: Electronic Commerce: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Annie Becker (Florida Institute of Technology, USA)
DOI: 10.4018/978-1-59904-943-4.ch077

Purchase

View Secure Multicast for Mobile Commerce Applications: Issues and Challenges on the publisher's website for pricing and purchasing information.

Abstract

With the rapid growth in mobile commerce (m-commerce) applications, the need for providing suitable infrastructure to support these applications has become critical. Secure multicast is a key element of this infrastructure, in particular, to support group m-commerce applications such as mobile auctions, product recommendation systems, and financial services. Despite considerable attention to m-commerce security, most existing security solutions focus on unicast communications. On the other hand, numerous solutions for secure multicast exist that are not specifically designed with m-commerce as a target environment. Clearly, to address secure multicast in m-commerce, we must start by forming a comprehensive picture of the different facets of the problem and its solutions. In this chapter, we identify system parameters and subsequent security requirements for secure multicast in m-commerce. Attacks on m-commerce environments may undermine satisfying these security requirements resulting, at most times, in major losses. We present a taxonomy of common attacks and identify core services needed to mitigate these attacks and provide efficient solutions for secure multicast in m-commerce. Among these services, authentication and key management play a major role. Given the varying requirements of m-commerce applications and the large number of current key management schemes, we provide a taxonomy and a set of performance metrics to aid m-commerce system designers in the evaluation and selection of key management schemes.

Related Content

Simriti Popli, Gabriel Wasswa. © 2024. 12 pages.
Pooja Lekhi. © 2024. 8 pages.
Shailey Singh. © 2024. 12 pages.
Shailey Singh. © 2024. 9 pages.
Tanuj Surve, Tuan Nguyen. © 2024. 17 pages.
Pawan Kumar, Sanjay Taneja, Mukul Bhatnagar, Arvinder K. Kaur. © 2024. 17 pages.
Azadeh Eskandarzadeh. © 2024. 15 pages.
Body Bottom