Abstract | ||
---|---|---|
Yeh and Tsai recently proposed an enhanced mobile commerce security mechanism. They modified the lightweight security mechanism due to Lam, Chung, Gu, and Sun to relieve the burden of mobile clients. However, this article shows that a malicious WAP gateway can successfully obtain the mobile client's PIN by sending a fake public key of a mobile commerce server and exploiting information leakage caused by addition operation. We also present a countermeasure against the proposed attack. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1093/ietisy/e91-d.5.1477 | IEICE Transactions |
Keywords | DocType | Volume |
lightweight security mechanism,security analysis,mobile client,addition operation,enhanced mobile commerce security,fake public key,proposed attack,yeh-tsai security mechanism,malicious wap gateway,information leakage,mobile commerce server,mobile commerce,security protocol,authentication,wap,public key | Journal | E91-D |
Issue | ISSN | Citations |
5 | 0916-8532 | 0 |
PageRank | References | Authors |
0.34 | 3 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Dae Hyun Yum | 1 | 315 | 24.95 |
Jong Hoon Shin | 2 | 10 | 1.20 |
Pil Joong Lee | 3 | 1039 | 103.09 |