Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

Security

Ensuring Strong Security for Mobile Transactions


The threats
In a recent paper titled Mobile Terminal Security, co-authors from Gemplus Innovation in France and Dublin City University in Ireland describe the vulnerabilities of mobile devices as follows:

[These devices] need essentially the same types of security measures as enterprise networks—access control, user authentication, data encryption, a firewall, intrusion prevention and protection from malicious code. [Yet] handheld devices and smart phones are often used precisely where they're most vulnerable—in public places, lobbies, taxis, airplanes—where risks include loss; probing or downloading of data by unauthorized persons; and frequently, theft and analysis of the device itself. Hence, in addition to logical security measures, mobile devices must [include] protective mechanisms against physical attacks.

Mobile devices are at risk both for the information they store and also for the information they transmit. PIN numbers, corporate passwords, bank account and credit card numbers are all at risk of theft if a device holding them is lost, stolen, hacked into or intercepted. The different connectivity approaches are attended by different degrees of risk. GSM, for example, provides one-way authentication—to the network but not from the network—which could allow someone to pose as the network and interact maliciously with the device. As well, GSM is not secured against active attacks.

Short-range standards such as Bluetooth make it possible for users to synchronize their wireless devices locally, but Bluetooth's PIN-based security mechanism has been shown to lack sufficient robustness for sensitive transactions of the sort being considered here. For its part, MeT recommends the use of near field communication (NFC) for mobile-device transactions. NFC is a standards-based, very short-range connectivity technology. Operating at around 13.56 MHz over just a few centimeters, it supports contactless identification and interconnection and conforms to ISO, ECMA, and ETSI standards.

Even so, given the need to protect both the data stored on the device and data in transmission, the most prudent approach is to embed security within the architecture of the device itself. As the authors of Mobile Terminal Security put it: "System architects should keep in mind that threats should be dealt with at the design level, the implementation level and the application use level." This has to be done in an interoperable way, transparent to the user and without having a negative effect on the performance of the device overall.

Back to basics
While it is a complicated challenge to balance stringent security needs with convenient, real-world usability, the good news is that the fundamentals of security—established practices used today in secure systems of all kinds still apply. In other words, there's no need to reinvent the wheel.

Transaction-based systems require three main features:

  1. Strong authentication. The system must be absolutely certain of who is participating in a given transaction.
  2. Non-repudiation. When a transaction is completed, there must be no way for either party to deny that it was executed willingly. This has historically been achieved through signed contracts or credit-card slips (where the signature on the slip prevents the purchaser from denying having made the purchase). In the digital world, the same method is employed via digital signatures.
  3. Confidentiality. Personal data on a device should be protected from casual access and data moving between devices during a transaction must be encrypted to avoid leaking private or transactional information.

Example of a secured transaction using a mobile phone

Privacy protection is of paramount importance to many users of electronic transaction systems, in part because the possibilities for abuses of the system are fairly obvious. Examples include the unauthorized collection of personal data from a badly secured device; tracking a person's movements by charting the location of his or her phone; eavesdropping on transactions; and interfering to make a service unreliable.


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.