Academia.eduAcademia.edu

A Comparison of Secure Mechanisms for Mobile Commerce

Mobile commerce has emerged as an innovative technology due to the prevailing of pervasive computing. However, on-line secure transaction mechanisms can not be applied to the mobile commerce due to the inadequate computing capability of mobile devices and lower security of wireless transmission than that of wired transmission. It is mandatory how to proceed securely with the transaction of on-line ordering and, in the meantime, to obtain proper protection of transaction issued by consumers via mobile devices. However, the secure connection mechanisms can be modified to apply to the mobile devices. This paper focuses on the comparison and analysis of the secure connection mechanisms in the mobile commerce.

Proceedings of the 7th WSEAS International Conference on Mathematics & Computers in Business & Economics, Cavtat, Croatia, June 13-15, 2006 (pp24-28) A Comparison of Secure Mechanisms for Mobile Commerce Hann-Jang Ho 1 and RongJou Yang 2 1 Department of Computer Science and Information Engineering 2 Department of Information Management WuFeng Institute of Technology 117, Chian-Kuo Rd., Sec. 2, Ming-Hsiung , Chia-yi 621 Taiwan, R.O.C. Abstract: - Mobile commerce has emerged as an innovative technology due to the prevailing of pervasive computing. However, on-line secure transaction mechanisms can not be applied to the mobile commerce due to the inadequate computing capability of mobile devices and lower security of wireless transmission than that of wired transmission. It is mandatory how to proceed securely with the transaction of on-line ordering and, in the meantime, to obtain proper protection of transaction issued by consumers via mobile devices. However, the secure connection mechanisms can be modified to apply to the mobile devices. This paper focuses on the comparison and analysis of the secure connection mechanisms in the mobile commerce. Key-Words: - Mobile Commerce, Secure Transaction Mechanism, WTLS, KSSL, WAP, WML 1 Introduction Since the invention of World Wide Web (WWW) by Tim Berners-Lee in 1990, Internet has gradually been employed to conduct the marketing activities and change the buying behavior of consumers following the development of EC-related technology. E-Commerce has numerously been employed as another virtual channel which is different from traditional brick-and-mortar channel in order to create business opportunity. Internet population increases rapidly following the rising and flourishing development of Internet. According to the investigation by ACI-FIND, Institute of Information Industry, Taiwan, the Internet population arrives 8 million and 920 thousands (39%) by June, 2004, which is 80 thousands more than in 2003 and has a 1% growth rate. Commercial Internet accounts arrived 1 million including most of the mobile accounts [1] which means much more enterprise have entered the EC market. Security is still a big issue concerning Internet shopping. According to eBrain Market Research, Consumer Electronics Association (CEA) conducted an investigation on the consumers’ intension of Internet shopping so as to understand the favorites of consumers and found that the lower price of the product is still one of the key factors and the convenience, privacy, and security are the next. Also, according to the investigation on the mandatory factors of Internet shopping from Princeton Survey Research Associates for Consumer Web Watch, the convenience, security, and trust are three most mandatory factors for consumers [1]. Therefore, the security of Internet shopping is a matter of importance. The development of EC is getting matured. Nowadays, mobile EC is topical subject in the area of mobile Internet. According to the investigation of ECRC-FIND, III, Taiwan, the mobile phone subscribers have arrived 23 million which is 102%, in the second quarter, 2004, meaning the era of mobile EC has emerged in order to get rid of the restriction of time and space [1]. However, there exists universal security concern in mobile EC in the environment of wireless network which has higher security risk than in wired network due to the data transmission in the air. A digital certificate, issued by a certification authority (CA), is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web. It contains applicant’s name, a serial number, expiration dates, a copy of the certificate holder's public key which is used for encrypting messages and digital signatures, and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. The digital certificates usually conform to X.509 standard and can be kept in registries so that authenticating users can look up other users' public keys. A PKI (public key infrastructure) enables users of a basically insecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that Proceedings of the 7th WSEAS International Conference on Mathematics & Computers in Business & Economics, Cavtat, Croatia, June 13-15, 2006 (pp24-28) can identify an individual or an organization and directory services that can store and revoke the certificates which can be checked by Web Sentry from Xcert based on the Online Certificate Status Protocol (OCSP). A PKI, known as asymmetric cryptography, uses the public key cryptography, which is the most common method on Internet for authenticating a message sender or encrypting a message consists of a digital certificate, issued by CA which is verified by registration authority (RA), which includes the public key or information about the public key, one or more directories where the certificates (with their public keys) are held, and a certificate management system. In public key cryptography, a public and private key are created simultaneously using the same algorithm (a popular one is known as RSA, an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman) by CA. Then, we can send an encrypted message using the receiver's public key and decrypt an encrypted message using the receiver's private key, or send an encrypted signature using the sender's private key and decrypt an encrypted signature to authenticate the sender using the sender's public key. A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a message (encrypted or not) or the signer of a document in order to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived also means that the sender cannot easily repudiate it later. In digital signature, a message hash (mathematical summary) of the document, sent by the sender, is obtained by using special software and encrypted as the signature by using a private key that has been previously obtained from a public-private key authority. The receiver makes a hash of the received message (signed document), decrypt the message hash or summary, and compares if the hashes match. In [7], the security of WAP WTLS was analyzed, the most important parts of the specification of WTLS and the reason of defects was presented, the existing security threat of WTLS was discussed, and an acceptable level of security was proposed. In [8], the authors proposed a building block for M-Commerce security platform constructed by WTLS security mechanism and based on J2ME MIDP and integrated with J2ME and WTLS security technology to provide more secure mobile business. In [9], a WTLS Crypto Module Security Policy encapsulated (embedded) in AirBEAM Safe software components using the WTLS layer to establish a secure tunnel between the client and the server, which is performed using the WTLS handshake protocol, was presented. WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. In [10], a number of security flaws, such as a chosen plaintext data recovery attack, a datagram truncation attack, a message forgery attack, and a key-search shortcut for some exportable keys were identified and discussed. 2 Secure Transaction Mechanisms in Mobile Commerce The secure encryption technology of WTLS in WAP, SSL, and SET are employed to integrate with WAP Gateway so as to provide a platform for the payment fulfillment for the card holders. A WAP gateway, for instance, decrypts encrypted data sent by a WAP phone using WTLS and re-encrypts it using SSL before forwarding it to the eventual destination server. The reverse process is used for traffic flowing in the opposite direction. Such a proxy-based architecture has some serious drawbacks. The proxy is not only a potential performance bottleneck, but also represents a “man-in-the-middle” which is privy to all “secure” communications. This lack of end-to-end security is a serious deterrent for any organization thinking of extending a security-sensitive Internet-based service to wireless users. In [3], a solution using standard security mechanisms and protocols on small wireless devices was implemented based on the Java 2 Micro-Edition (J2ME) platform that offers fundamental cryptographic operations such as message digests and ciphers as well as higher level security protocols like SSL and their results show that SSL is a practical solution for ensuring end-to-end security of wireless Internet transactions even within today’s technological constraints. Following the vigorous development of mobile EC, the emerging WAP moves EC forward to mobile EC. As Internet is mentioned, computer virus, hackers, public key, encryption, etc. come to one’s mind. What about the security concern in mobile devices? Some security mechanisms in mobile devices are discussed in section 3 and 4. 3 Wireless Transport Layer Security Proceedings of the 7th WSEAS International Conference on Mathematics & Computers in Business & Economics, Cavtat, Croatia, June 13-15, 2006 (pp24-28) WTLS is the security level for Wireless Application Protocol (WAP) applications. Based on Transport Layer Security (TLS) v1.0 (a security layer used in the Internet, equivalent to Secure Socket Layer 3.1), WTLS was developed to address the problematic issues surrounding mobile network devices - such as limited processing power and memory capacity, and low bandwidth - and to provide adequate authentication, data integrity, and privacy protection mechanisms. Wireless transactions, such as those between a user and their bank, require stringent authentication and encryption to ensure security to protect the communication from attack during data transmission. Because mobile networks do not provide end-to-end security, TLS had to be modified to address the special needs of wireless users. Designed to support datagram in a high latency, low bandwidth environment, WTLS provides an optimized handshake through dynamic key refreshing, which allows encryption keys to be regularly updated during a secure session. WTLS is the security layer of the WAP, providing privacy, data integrity and authentication for WAP services. WTLS, designed specifically for the wireless environment, is needed because the client and the server must be authenticated in order for wireless transactions to remain secure and because the connection needs to be encrypted. For example, a user making a transaction with a bank over a wireless device needs to know that the connection is secure and private and not subject to a security breach during transfer (referred to as a man-in-the-middle attack). WTLS is needed because mobile networks do not provide complete end-to-end security. WTLS is based on the widely used TLS v1.0 security layer used in Internet. Because of the nature of wireless transmissions, modifications were made to the TLS v1.0 in order to accommodate for wireless' low bandwidth, datagram connection, limited processing power and memory capacity, and cryptography exporting restrictions. The Wireless Transport Layer Security (WTLS) protocol provides the mechanism for obtaining secure sessions using public key cryptography. WTLS supports two public key cryptosystems: RSA and Elliptic Curve Cryptography (ECC). In [4], an analytical performance model of the WTLS handshake protocol was derived by using two public key cryptosystems supported by WTLS: RSA and Elliptic Curve Cryptography (ECC). ECC provides much more security than RSA at a lower computational cost and their experimental evidence shows that ECC indeed outperforms RSA in realistic wireless secure scenarios. National Institute of Standards and Technology (NIST ) [5] announced a Draft Federal Information Processing Standard (FIPS), proposing Rijndael as AES expected to replace Data Encryption Standard (DES). WTLS provides related services concerning authentication, encryption, and integrity and supports RC5, SHA-1, IDEA, and AES algorithms. WTLS internal architecture [6] is indicated in Table 1. Tab. 1 WTLS Internal Architecture Full Handshake Protocol Alert Protocol Application Protocol Change Cipher Specification Protocol Record Protocol The Record Protocol takes care of the data integrity and authentication and supports four protocol clients: the full handshake protocol, the alert protocol, the application protocol, and the changer cipher spec protocol. External applications have direct access to the WTLS layer using the Wireless Markup Language (WML) Script. All the security related parameters are agreed on during the handshake. These parameters include attributes such as protocol versions, cryptographic algorithms, and information on the use of authentication and public key techniques to generate a shared secret. There are three descriptions of alert messages: fatal, critical, and warning. Alert messages are sent using the current secure state, i.e. compressed and encrypted, or under null cipher spec, i.e. without compression or encryption. The Change Cipher Spec is sent either by the client or the server. By means of this message, both parties decide that they start using the negotiated session parameters. When the Change Cipher Spec message arrives, the sender of the message sets the current write state to the pending state and the receiver also sets the current read state to the pending state. The Change Cipher Spec message is sent during the handshake phase after the security parameters have been agreed on. WAP stack protocol is indicated in Figure 1. WAE and the application for wireless phones (Wireless Telephony Application WTA) are the main interface to the client device, which gives and controls the description language, the script language of any application and the specifics of the telephony. WSP delivers all functions that are needed for wireless connections. A session mainly consists of 3 phases: start of the session, transferring information back and forth and the end of the session. Additionally, a session can be interrupted and started again (from the point where it was interrupted). Proceedings of the 7th WSEAS International Conference on Mathematics & Computers in Business & Economics, Cavtat, Croatia, June 13-15, 2006 (pp24-28) Like the User Datagram Protocol (UDP), the WTP runs at the head of the datagram service and supports chaining together protocol data and the delayed response to reduce the number of transmissions. The protocol tries to optimize user interaction in order that information can be received when needed. WTLS is an optional layer or stack which consists of description devices and contains a check for data integrity, user authentication and gateway security. A secure transmission is crucial for certain applications such as e-commerce or WAP-banking and is a standard in these days. WDP represents the transfer or transmission layer and is also the interface of the network layer to all the above stacks/layers. With the help of WDP the transmission layer can be assimilated to the specifications of a network operator. This means that WAP is completely independent from any network operator. The transmission of SMS, USSD, CSD, CDPD, IS-136 packet data and GPRS is supported. The Wireless Control Message Protocol (WCMP) is an optional addition to WAP, which will inform users about occurred errors. WAE (Wireless Application Environment) – Application layer Other Services and Applications WSP (Wireless Session Other Services and Protocol) – Session layer Applications WTP (Wireless Transaction Protocol) Other Services and – Transaction layer Applications WTLS (Wireless Transport Layer Security) – Other Security Layer Services and Applications WDP (Wireless Datagram Protocol) – Transport Layer GSM IS-136 Bearers: CDMA PHS CDPD iDEN Etc Fig. 1 WAP Protocol Stack [7] For instance, in the transaction processing of mobile banking, the connection is established between mobile device and WAP gateway after WTLS security verification and then between WAP gateway and Web server of the bank after SSL encryption transformation. Afterwards, Web server issues a “navigation document” which is responded to in reverse direction and used by mobile device so as to commit the transaction in a private and secure area. 4 Wireless Transport Layer Security Nowadays, SSL is in widespread use in secure on-line transaction but unsuitable for mobile device due to the inadequacy of computing capability and memory. Therefore, WAP Forum proposed WTLS for secure wireless transmission in which a proxy server is mandatory for decoding and encoding between SSL encryption and WTLS encryption. However, there exists security vulnerabilities exposure to intrusion in the small period of time between decoding and encoding. J2ME MIDP supports KSSL and provides API for secure wireless network transaction in mobile devices. KSSL (Kerberized or KiloByte SSL), based on SSL 3.0, is for wireless or small devices. J2ME MIDP for developers supports a development platform for the information interchange between SSL and network by providing API for secure wireless network. An SSL client, called KSSL, was implemented on a Palm PDA and its performance was also evaluated in [11]. In MIDP 1.0 specification, the software vendors are mandatory to provide HTTP support. In MIDP 1.0.3 and above, in addition to http://urls we can use https://urls to connect to Web server. Sun J2ME Wireless Tool Kit 1.0.4 supports KSSL. In WTK1.0.4, the way using HTTPS is simple and described as follows: String url = https://host.com/files; HttpConnection hc = HttpConnection Connector.open (url); After the connection is established, HTTPS server can verify, deny, or install the certificate. The comparison of WTLS and KSSL security mechanism based on privacy, integration, identification is indicated in Table 2. In WAP, unencrypted transmission data are inclined to attacks. J2ME provides end-to-end security through KSSL instead of the gateway between mobile device and server and allows local processing of the data instead of remote processing in WAP, thus reduces enormously the possibility of attacks. Tab. 2 Comparison of WTLS and KSSL [12] [13] [14] Functionality Privacy WTLS KSSL RSA, Diffie-Hellman, and RSA (key exchange) Elliptic Curve and RC4 (encryption) Diffie-Hellman supported encryption algorithm supported Proceedings of the 7th WSEAS International Conference on Mathematics & Computers in Business & Economics, Cavtat, Croatia, June 13-15, 2006 (pp24-28) Integrity Authentication SHA-1 and MD5 MAC algorithms; Message protected Message protected with MD5 and SHA with SHA-1 RSA, Elliptic Curve Diffie-Hellman, and Diffie-Hellman based X.509 certificate key exchange suites; Verified for upper layers of WAP 5 Conclusion Secure payment mechanisms can set consumers’ mind at ease to conduct the on-line transactions. It also provides the convenience for consumers by applying it to mobile device. This paper investigates the on-line security mechanisms and its application in mobile EC. The on-line security mechanisms can not completely be applied to mobile EC due to the lack of computing capability of the mobile device. A secure payment mechanism is an efficient instrument to promote EC. This paper investigates the mainstream of secure transaction mechanism in mobile commerce: Wireless Transport Layer Security (WTLS) and KSSL (Kerberized or KiloByte SSL). Under the investigation, we find that the security level of WTLS employed in mobile device is still inadequate at present. In recent years, WAP users have substantially decreased. Therefore, KSSL being employed in WAP to redeem the drawback of WTLS and how to ensure the security in mobile EC are future directions. Acknowledgement This work was supported by Taiwan NSC under grant no. NSC-94-2622-E-274-002-CC3. References: [1]http://www.find.org.tw/ , “FIND Internet Information Center”, Institute of Information Industry, Taiwan [2]http://www.itri.org.tw/, Industrial Technology Research Institute, Taiwan [3]V. Gupta and S. Gupta, “KSSL: Experiments in Wireless Internet Security”, Sun Microsystems Laboratories, http://research.sun.com/techrep/2001/smli_tr-200 1-103.pdf, 2001 [4]F. R. Henriqueq, C. E. LbpeEPeza, and M. A. Leon-Chivez, “Comparative Performance Analysis of Public -Key Cryptographic Operations in the WTLS Handshake Protocol”, 1st International Conference on Electrical and Electronics Engineering, pp. 124-129, 2004 [5]http://csrc.nist.gov/encryption/aes/index.html comments, National Institute of Standards and Technology [6]Thanh V. Do and Kris Gaj, “WAP Security: WTLS”, INFT 931, Secure Telecommunication Systems, 2001 [7]G. Radhamani and K.Ramasamy, “Security issues in WAP WTLS protocol”, IEEE International Conference on Communications, Circuits and Systems and West Sino Expositions, vol.1, pp. 483 – 487, 2002. [8]N. J. Park and Y. J. Song, “M-Commerce Security Platform based on WTLS and J2ME”, ISIE, 2001. [9]Columbitech, “WTLS Cryptographic Module Version 1.2, 1.3.1, 1.3.3”, Level 1 Validation, Symbol Technologies, http://csrc.nist.gov/cryptval/140-1/140sp/140sp3 07.pdf, 2005. [10] M. J. Saarinen, “Attacks against the WAP WTLS Protocol”, http://www.freeprotocols.org/harmOfWap/wtls.p df [11] V. Gupta and S. Gupta, “KSSL: Experiments in Wireless Internet Security”, Sun Microsystems Laboratories, http://research.sun.com/techrep/2001/smli_tr-200 1-103.pdf, 2001 [12]WAP Forum. Wireless Transport Layer Security Specification Version 1.1, November 2, 1999, http://www.wapforum.org/ [13]F. R. Henriqueq, C. E. LbpeEPeza, and M. A. Leon-Chivez, “Comparative Performance Analysis of Public -Key Cryptographic Operations in the WTLS Handshake Protocol”, 1st International Conference on Electrical and Electronics Engineering, pp. 124-129, 2004 [14]A. Macphee, “Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Version 1.1”, http://www.entrust.com/resources/pdf/understan ding_wtls.pdf, Entrust, 2001.