跳到主要內容

臺灣博碩士論文加值系統

(44.211.117.197) 您好!臺灣時間:2024/05/22 01:46
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳瑜晴
研究生(外文):CHEN,YU-CHING
論文名稱:LTE環境下之輕量化行動支票系統設計
論文名稱(外文):A Light-weight LTE-based Supplemental Service : Mobile Check
指導教授:李榮三李榮三引用關係
口試委員:周永振鄭婷方
口試日期:2017-06-17
學位類別:碩士
校院名稱:逢甲大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:中文
論文頁數:35
中文關鍵詞:行動支票加值服務LTE電子商務BAN logic
外文關鍵詞:M-checkSupplementary ServiceLTEe-commerceBAN logic
相關次數:
  • 被引用被引用:0
  • 點閱點閱:239
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近幾年年,隨著無線通訊科技的蓬勃發展,行行動支付也快速成長。人們可以使
用手機享有許多服務,例例如簡訊傳送、語音服務及影片,特別是線上交易易的進行行。
因此,我們提出一個嶄新的手機加值服務並且搭配熱門的LTE 行行動上網─行行動支
票。在我們的方法中,手機用戶可以透過行行動支票去和商家進行行線上交易易。此外,
行行動支票仍然保有紙本支票的功能,並且達到更更多方便便性與靈靈活性。手機用戶不不
需要承擔支票遺失或損壞的風險且能夠和網路路商家和實體店家完成交易易。在安全
分析中,我們的架構能達到行行動支票的基本安全需求。除此之外,我們的方法能
達到較低的計算量量而且有利利於在手機端。最後,我們還使用BAN logic 對我們設
計的系統進行行嚴謹的分析。
With the flourishing development of mobile communication technologies, mobile
payment is expected to grow tremendously in the coming years. Individuals can use
smartphones for services such as messaging, audio, video, and online trading. Hence,
we present a novel supplementary service for mobile subscribers in Long-Term
Evolution (LTE) environment, called mobile check (M-check). Our scheme enables a
mobile subscriber to conduct business online with virtual merchant from a mobile
device, and maintains the convenience and flexibility of physical checks. The security
analysis demonstrates that the proposed M-check mechanism satisfies the essential
requirements. Compared with existing schemes, our proposed scheme incurs lower
computation so that it is more suitable for various practical mobile applications.
Furthermore, we simulate the correctness of mutual authentication by the widely
known Burrows–Abadi–Needham (BAN) logic tool for formal security analysis.
摘要 i
Abstract ii
Table of Contents iii
List of Figures iv
List of Tables v
Chapter 1 Introduction 1
Chapter 2 Related Works 4
2.1 Overview of the Evolved Packet System Architecture 4
2.2 LTE Security Architecture (EPS-AKA Protocol) 5
Chapter 3 The Proposed Scheme 7
3.1 Registration Phase 8
3.2 Transaction Phase 10
Chapter 4 Security Analysis 13
4.1 Robustness 14
4.2 Double Spending 20
4.3 Lightweight 20
4.4 Mobility 21
4.5 Convenience 21
Chapter 5 Performance Comparisons 22
5.1 Comparisons of Communication Cost 22
5.2 Comparisons of Computational Cost 23
Chapter 6 Conclusions 26


[1]The Statistics Portal for Market Data, Market Research and Market Studies, http://www.statista.com.
[2]The Global Mobile Suppliers Association, http://gsacom.com.
[3]P. W. Tian, Y. X. Zhang, Y. Z. Zhou, L. T. Yang, M. Zhong, L. K. Weng, and L. Wei, “A Novel Service Evolution Approach for Active Services in Ubiquitous Computing,” International Journal of Communication Systems, Vol. 22,
pp. 1121-1151, 2009.
[4]Y. Liu, Z. Chen, F. Xia, X. Lv, and F. Bu, “An Integrated Scheme based on Service Classification in Pervasive Mobile Services,” International Journal of Communication Systems, Vol. 25, No. 9, pp. 1178-1188, 2012.
[5]D. Forsberg, “LTE Key Management Analysis with Session Keys Context,” Computer Communications, Vol. 33, No. 16, pp. 1907-1915, 2010.
[6]J. Cao, M. Ma, H. Li, Y. Zhang, and Z. Luo, “A Survey on Security Aspects for LTE and LTE-A Networks,” IEEE Communications Surveys & Tutorials, Vol. 16, No. 1, pp. 283-302, 2014.
[7]K. Prakash and B. Muniyal “Authentication and Key Agreement in 3GPP Networks,” Computer Science & Information Technology (CS & IT),
pp. 143-154, 2015.
[8]M. Purkhiabani, A. Salahi, and M. Nejati, “Analysis of Authentication Traffic in Next Generation 3GPP LTE Networks,” in Proceedings of Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1-8, 2011.
[9]A. Choudhary and R. Bhandari, “Analysis of UMTS (3G) Authentication and Key Agreement Protocol (AKA) for LTE (4G) Network,” International Journal on Recent and Innovation Trends in Computing and Communication, Vol. 3,
No. 4, pp. 2146-2149, 2015.
[10]K. A. Alezabi, F. Hashim, S. J. Hashim, and B. M. Ali, “An Efficient Authentication and Key Agreement Protocol for 4G (LTE) Networks,” in Proceedings of 2014 IEEE Region 10 Symposium, pp. 502-507, 2014.
[11]A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CPC press, pp. 321-376, 1996.
[12] W. Stallings, “Cryptography and network security: principles and practice,” 4th Edition, Prentice Hall, 2006.
[13]M. Burrows, M. Abadi, and R. Needham, “A Logic of Authentication,” ACM Transactions on Computer Systems, Vol. 8, No. 1, pp. 18-36, 1990.
[14]M. Burrows, M. Abadi, and R. Needham, “Authentication: A Practical Study in Belief and Action,” in Proceedings of 2nd Conference on Theoretical Aspects of Reasoning about Knowledge, CA, USA, pp. 325-342, 1988.
[15]C. C. Chang, S. C. Chang, and J. S. Lee, “An On-line Electronic Check System with Mutual Authentication,” Computers and Electrical Engineering, Vol. 35,
pp. 757-763, 2009.
[16]Z. Zhou, C. N. Yang, and C. F. Chen, “Reducing Computations in Chang et al.’s on-line Electronic Check,” International Journal of Security and Its Applications, Vol. 10, No. 10, pp. 271-288, 2016.

電子全文 電子全文(本篇電子全文限研究生所屬學校校內系統及IP範圍內開放)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top