Ecc And Mobile Transactions

Read Complete Research Material

ECC AND MOBILE TRANSACTIONS

Ecc And Mobile Transactions



Abstract

The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for mobile users and applications. Security requirements for each application are different, as well as the hardware capabilities of each device. To make things worse, wireless medium conditions may change dramatically with time, incurring great impact on performance and QoS guarantees for the application. Currently, most of the security solutions for mobile devices use a static set of algorithms and protocols for services such as cryptography and hashes. This study proposes a security service, which works as a middleware, with the ability to dynamically change the security protocols used between two peers. These changes can occur based on variations on wireless medium parameters and system resource usage, available hardware resources, application-defined QoS metrics, and desired data “ security levels”. We compare our solution to some widespread static security protocols, demonstrate how our middleware is able to adapt itself over different conditions of medium and system, and how it can provide a performance gain in the execution of cryptographic primitives, through the use of data semantics.

Table of Contact

Abstract2

Table of Contact4

Chapter15

Introduction5

Background5

Purpose Of Study6

Problem Statement6

Hypothesis6

Significance7

Chapter27

Literature Review7

The main contributions of this work are:11

Related work12

Chapter316

Methodology16

Models and definitions16

Network17

Security algorithms and protocols18

Definition 119

Definition 219

Parameters and metrics20

Definition 320

Definition 421

Table 1.23

Problem characterization27

Semantic data description30

Security Configuration31

First, we define the term Security Configuration: Definition 831

Annotation language33

Definition 934

Listing 1 LACS : Security definition example35

Listing 2 LACS : Message definition example37

Listing 3 LACS : Transmission model example40

Proposed solution42

Middleware configuration43

System design and architecture44

About the security provided by the middleware47

Implementation50

Table 2.51

Table 3.51

Protocol selection overhead54

Chapter457

Results57

Capacity of adaptation57

Chapter560

Conclusions60

Reference64

Chapter1

Introduction

Background

The tremendous advances in wireless data communication and mobile computing have created a new computing paradigm that promises to provide services anytime and anywhere for everyone. Such an environment enables users to access a wide range of services and applications using a large variety of mobile and ubiquitous devices. Voice and video streaming, file transfers, notification and localization are some examples of applications developed for this environment.

Purpose Of Study

Purpose of the study is to analyze the danger that the M-Pesa sevice can be compromised as most use g2 phone and would propose ECC to secure the transactions.

Problem Statement

A telephone company providing services in kenya and a apart of vodaphone they have a service known as m-pesa where people without bank accounts use their mobile phone to purchase services and goods. the danger is that the sevice cn be compromised as most use g2 phone and would prppose ECC to secure the transactions.

Hypothesis

We suppose a context-aware security middleware that dynamically changes the security protocols used between a pair of peer-entities according to a set of variables. Our service, named ASecMid, monitors some parameters related to the wireless medium conditions, system resource usage, hardware capabilities, application-defined QoS metrics, and desired security services. Our solution transparently chooses the best security protocol for each transmission, from a large collection of protocols, according to the parameters ...
Related Ads