security of identity authentication models. One is
formal security analysis; another one is building
security evaluation system.
Formal security analysis is a kind of methods
based on Dolev-Yao model (Hai-yan Q, 2008). This
model hypothesizes encryption is "perfect", and
attacker can intercept any text. Formal security
analysis includes strand spacer method (Javier T,
1999), BAN method (Burrows M, 1990) and
inductive approach method (Lawrence, 1998). These
methods can prove whether the identity
authentication scheme is security in ideal condition.
But actual application environments of the identity
authentication are not in ideal condition, so these
methods can prove the security of identity
authentication schemes only theoretically.
Identity authentication evaluation system can be
divided into evaluation systems for similar models
which have same authentication factor (such as
having the same authentication encryption
algorithm
or having the same authentication technology, etc.)
and evaluation systems for new models.
Identity authentication evaluation systems for
similar models comprehensively compare models’
security and performance in particular network
environment. Wei Liang (2005) and other
researchers divide analysis indictors into security
indictors and quality of service (QoS) indictors.
Based on the identity authentication data encryption,
data integrity, privacy protection and
non-repudiation, challenges / response models are
divided into four security index. By using the
method above, although boundaries clear to divide
and easy to operate, it cannot effectively compare
highly similarity identity authentication models.
Charlott E and other researchers propose identity
authentication evaluation system based on mobile
platform IP Multimedia Subsystem (IMS). The
system includes three basic parts: security,
user-friendly and simplicity and researchers point
out that three basic parts are interdependent. SWOT
analysis method, user ranking method and
simulation are used to compare different models
(Charlott E, 2009). Although this paper put forward
a complete and meticulous evaluation system, it does
not give a clear solution about how to use the system
to evaluation identity authentication models.
Patroklos G.A. (2004) and other three researchers
compare three security protocols (SSL, S/MINE and
IPSec) which are widely used in normal network
according to length of the key and time cost of
mutual authentication execution. The research closes
to reality application, but does not fit every model.
Evaluation systems for new models are
established to compare new models with similar
models, in order to indicate advantages of the new
one. Researcher Vipul Gupta (2002) proposes a new
SSL protocol based on ECC, and compares the
performance between the new protocol and SSL
protocol based on RSA. Yong-bin Zhou (2009) and
other researchers improve MAKAP protocol and
prove the security of the improved protocol as well
as compare the improved protocol with the old one
on calculate cost, communication cost and storage
cost. Zhi-qiang Xie (2009) and other researchers
propose new S/KEY authentication scheme and
compare the improved protocol with the old one on
mid-man-attack, decimal attack, secret key security
and so on. This kind of research focus on discussing
the model about it’s resistance to attack and unfit for
evaluation and comparison with other types of
authentication schemes. Most of this researches
limited in theoretical analysis and have no
quantitative evaluation results.
3 THE M-COMMERCE
SECURITY INDICATORS
EVALUATION SYSTEM
The evaluation system is established to meet mobile
commerce identity authentication schemes’
characteristics, which can reflect the characteristics
of mobile commerce properties and the effect of the
identity authentication.
Characteristics of mobile commerce mainly
embodies in three aspects: network environment,
terminal characteristics and service features. Small
bandwidth, high BER (bit error ratio) and the
opening of interface make mobile communication
network in numerous threats and these threats may
lead to different kinds of attacks. Mobile terminal
equipment has low storage capacity, battery power
specialty and its high secrecy request makes the
security of user information becoming more
important. At the same time, mobile commerce
customers generally require information immediately,
which means the immediacy of the service.
Evaluation system should be able to reflect the
characteristics of mobile commerce and make
mobile commerce identity authentication different
from identity authentication applications in common
net work environment.
Security is the most important part of identity
authentication effect. Researcher Mangipudi Kumar
V.K.N. (2005) proposes identity authentication
design framework based on the wireless network,
ICISO 2010 - International Conference on Informatics and Semiotics in Organisations
246