{"title":"A secure m-commerce model based on wireless local area network","authors":"Xiaohui Li, W. Kou","doi":"10.1109/AINA.2004.1283857","DOIUrl":null,"url":null,"abstract":"The focus of this paper is on a secure mobile commerce model based on wireless local area network (WLAN). The model is investigated through the accessing procedure, the roaming management procedure, and the electronic trade procedure. To solve the security problem in the WLAN, a novel authentication method is proposed, in which the mobile node (MN) is validated twice by an access point (AP) and a mobile agent (MA), and all the devices are authenticated in a register procedure with the PKI/CA mechanism. Finally, the advantages of the model are analyzed.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"20 14","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2004.1283857","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The focus of this paper is on a secure mobile commerce model based on wireless local area network (WLAN). The model is investigated through the accessing procedure, the roaming management procedure, and the electronic trade procedure. To solve the security problem in the WLAN, a novel authentication method is proposed, in which the mobile node (MN) is validated twice by an access point (AP) and a mobile agent (MA), and all the devices are authenticated in a register procedure with the PKI/CA mechanism. Finally, the advantages of the model are analyzed.