Formal Verification of Secure Payment Framework in MANET for Disaster Areas

In this chapter, the authors propose a secure payment framework in mobile ad hoc network for disaster areas. In order to enable transactions in a disaster area using existing payment systems, we need infrastructure to communicate such as wired networks and base stations for cellular networks which are damaged by natural disasters. The authors propose to use mobile agent technology and digital signature with message recovery (DSMR) mechanism based on ECDSA mechanism to enable transactions in a disaster area using ad hoc networks.

[1]  Min-Shiang Hwang,et al.  Digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem , 2004, Comput. Stand. Interfaces.

[2]  Martín Abadi,et al.  Authentification and Delegation with Smart-Cards , 1993, Sci. Comput. Program..

[3]  Jesús Favela,et al.  mobileSJ: Managing Multiple Activities in Mobile Collaborative Working Environments , 2008, Int. J. e Collab..

[4]  John C. Grundy,et al.  Off-Line Micro-Payment Protocol for Multiple Vendors in Mobile Commerce , 2006, 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06).

[5]  Yu-Chee Tseng,et al.  Integrating mobile IP with ad hoc networks , 2003, Computer.

[6]  Chin-Chen Chang,et al.  Digital signature with message recovery using self-certified public keys without trustworthy system authority , 2005, Appl. Math. Comput..

[7]  Qiaoyan Wen,et al.  An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network , 2012, Comput. Commun..

[8]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[9]  Miguel Mira da Silva,et al.  Secure Mobile Agent Digital Signatures with Proxy Certificates , 2001, E-Commerce Agents.

[10]  Zuhua Shao Improvement of digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem , 2004, Comput. Stand. Interfaces.

[11]  Jesús Téllez Isaac,et al.  Anonymous Payment in a Client Centric Model for Digital Ecosystems , 2007, 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

[12]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[13]  Cjf Cas Cremers Scyther : semantics and verification of security protocols , 2006 .

[14]  Sherali Zeadally,et al.  A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks , 2008, Comput. Commun..

[15]  Davy Monticolo,et al.  An Ontological Approach to Managing Project Memories in Organizations , 2009 .

[16]  Hung-Yu Chien,et al.  Digital signature with message recovery using self-certified public keys and its variants , 2003, Appl. Math. Comput..

[17]  N. Kock E-Collaboration Technologies and Organizational Performance: Current and Future Trends , 2010 .

[18]  José María Sierra,et al.  Anonymous Payment in a Kiosk Centric Model using Digital signature scheme with message recovery and Low Computational Power Devices , 2006, J. Theor. Appl. Electron. Commer. Res..

[19]  Ratan K. Guha,et al.  A logic-based verification framework for authentication protocols , 2007 .

[20]  Ayman E. Khedr,et al.  A Proposed Framework to Explore Semantic Relations for Learning Process Management , 2019, Int. J. e Collab..

[21]  Kelly Burke,et al.  A Framework Describing the Relationships among Social Technologies and Social Capital Formation in Electronic Entrepreneurial Networking , 2009, Int. J. e Collab..

[22]  Ratan K. Guha,et al.  Understanding the intruder through attacks on cryptographic protocols , 2006, ACM-SE 44.