Secure Banking: Authenticating Peer-to-Peer Ad Hoc Interactions

Research Article
Secure Banking: Authenticating Peer-to-Peer Ad Hoc Interactions

Khalid Mahmood, Imran Hameed, Khalid Rashid and Amir Qayyum

Journal of Applied Sciences, 2003, 3(5), 346-359.

Abstract

Research on mobile ad hoc networks has been focused primarily on routing protocols, whereas security issues remained mostly unexplored. This paper focuses on security mechanisms and notably on the key management mechanisms. Our authentication protocol is inspired from Resurrecting Duckling policy with a novel diversity. We present a reliable solution for securing bank transactions. In our approach devices exchange a limited amount of public information over location-constrained channel, which will later allow them to complete key exchange over wireless link. After the exchange of public keys, our banking transactions will be secure. This approach does not require any public key infrastructure as is required in MANET. Moreover our approach is secure against passive attacks on location-limited channel and all kinds of wireless attacks on wireless link.

ASCI-ID: 35-531

Cited References Fulltext

Similar Articles


Integrating Different Semantics of Classification Levels in Heterogeneous Distributed Database System

Journal of Applied Sciences, 2002, 2(5), 553-557.

An Authentication Protocol for Multicast Communications

Journal of Applied Sciences, 2002, 2(12), 1082-1083.

Cryptanalysis of an Authentication Key Exchange Protocol

Journal of Applied Sciences, 2005, 5(2), 281-283.

An Accurate Method to Obtain Bio-Metric Measurements for Three Dimensional Skull

Journal of Applied Sciences, 2010, 10(2), 145-150.

Implementing Secure RSA Cryptosystems Using Your Own Cryptographic JCE Provider

Journal of Applied Sciences, 2006, 6(3), 482-510.

Improvement of Fixing Problems in Lin et al.’s OSPA Protocol

Journal of Applied Sciences, 2006, 6(3), 639-643.

Analysis and Enhancement of Authentication Algorithms in Mobile Networks

Journal of Applied Sciences, 2006, 6(4), 872-877.

Security of the Cryptographic Protocols Based on Discrete Logarithm Problem

Journal of Applied Sciences, 2005, 5(9), 1692-1712.

An Elliptic Curve-Based Signcryption Scheme with Forward Secrecy

Journal of Applied Sciences, 2009, 9(6), 1025-1035.

Research on Charging Technology of Mobile Self-organizing Internet

Journal of Applied Sciences, 2013, 13(17), 3599-3603.

MANET-internet Integration Architecture

Journal of Applied Sciences, 2017, 17(6), 264-281.

On Remote Attestation Based on Trusted Cloud Computing

Journal of Applied Sciences, 2013, 13(22), 5092-5098.