in the UK. Most users are used to high speed internet
access via PC-based web browsers, which are not as
common in Japan. So there may be less interest
generally in web access via mobile phone. The low
data speeds available using today’s circuit switched
wireless networks are probably a factor, although the
emerging always-on, packet-switched 3G wireless
systems are supposed to provide bandwidths up to 2
Mbps. Another possibility is the user interface itself.
Having to negotiate multiple tiny screens to
complete simple Web transactions is clumsy and
uncomfortable for many users. Screens on i-mode
mobile phones are usually somewhat larger. In any
case, it is a fact that in the UK, mobile phones are
largely perceived as devices intended for voice
communications rather than for data applications.
Despite the lack of mobile commerce activity
today, there are several industry initiatives that seek
to address the problem of secure financial or
commerce transactions from a mobile phone or other
mobile wireless devices. Among these are
(Radicchioi, 2002 ): Visa Mobile 3D-Secure,
Mastercard Secure Payment Application, Global
Mobile Commerce Interoperability Group, Mobile
Electronic Transactions (MeT), Mobey Forum,
Mobile Payment Forum, Paycircle. These initiatives
focus on the larger questions of mobile payment
alternatives, without focusing specifically on user
authentication. The concept of a mobile wallet is
important in many of these mobile payment
alternatives. The mobile wallet allows the storage of
information about a purchaser, such as shipping
address, as well as information about multiple credit
cards (Corcoran, 2002). Unlike PC-based wallets,
mobile wallets provide a value-added service to a
mobile user, since they eliminate the need to provide
credit card and shipping details via the limited
interface capabilities of the mobile phone. A mobile
wallet can reside either on a mobile phone itself, or
at a remote wallet server accessible over the internet.
There are several advantages to a server-based
wallet, including efficiencies related to upgrades and
additional functionality that can be added by the
service provider. A server-based wallet can also be
accessed by more than one mobile phone.
4.1 Two-Factor User Authentication
Two-factor authentication for mobile commerce may
be based not only on a PIN or password, but also on
user possession of a token. A specific mobile phone
that has previously been registered with a mobile
wallet could act as the token. Shi et al (Shi, 2004)
suggests that a mobile phone’s Mobile Station ISDN
Number (MSISDN) might be used to identify a
particular phone. For GSM mobile phones
containing a SIM card holding identifying
information such as a phone number, it is actually
the SIM card that acts as the token. The
authentication process would require that not only
the password or PIN, but also the identifying
information contained on an internal chip or SIM
card in the mobile phone, be passed to the server-
based mobile wallet.
A mobile phone might also contain an internal
chip containing the wallet, or it might have a slot
into which a smartcard containing the wallet can be
inserted. The Mobey Forum, whose members are
mainly European banks and other international
companies, endorses a scheme based on a bank-
issued chip card that can be inserted into the mobile
device. Embedded within the chip is a wallet
containing payment and fulfilment (i.e., shipping)
information. Users would authenticate themselves to
the wallet using a password, but possession of the
mobile phone containing the wallet itself would act
as the second security factor.
Radicchio is another international consortium
(Radicchioi, 2002 ) concerned with secure mobile
commerce. The Radicchio approach is based on a
wireless PKI, which ensures that mobile commerce
transactions satisfy several important security-
related criteria. These are: integrity, authentication,
confidentiality and non-repudiation. PKI is based on
establishing trusted relationships between
participants, and involves the use of a private key by
which an authorised user can encrypt a message that
can only be decrypted with the corresponding public
key. This establishes the user’s digital signature.
However, the authentication part of the PKI
paradigm depends on a mechanism, which ensures
that only the correct party can gain access to their
private key. Radicchio uses a two-factor approach to
authentication. Private keys are stored on a smart
card that must be in the possession of the authorised
user. This smart card may be in the form of a SIM
card for GSM mobile phones, or a larger card that
can be inserted into a slot. The private key is then
unlocked using a PIN.
ENHANCING THE SECURITY OF MOBILE E-COMMERCE WITH A HYBRID BIOMETRIC AUTHENTICATION
SYSTEM
249