2011
DOI: 10.1007/978-3-642-17878-8_42
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification of a Secure Mobile Banking Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…This approach requires a session key generation and distribution between participating entities, on the basis of the mobile operator only. Ngo et al 22 developed a framework for formal verification of secure mobile banking protocol that encompasses on advanced authentication mechanism to provide strong authentication schemes. But, the integration of smart card and biometric feature requires more operations between the client and the bank.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach requires a session key generation and distribution between participating entities, on the basis of the mobile operator only. Ngo et al 22 developed a framework for formal verification of secure mobile banking protocol that encompasses on advanced authentication mechanism to provide strong authentication schemes. But, the integration of smart card and biometric feature requires more operations between the client and the bank.…”
Section: Related Workmentioning
confidence: 99%
“…We compare our proposed work with the existing solutions, in previous studies [12][13][14][15][16][17][18][20][21][22] and Johnny et al, 46 for attacks resilience. We mentioned some of the attacks in the previous subsection, regarding the most well-known attacks such as replay, node capture, man-in-the-middle, impersonation, SQL-injection, which cover parts of the attacks resilient summary in Table 5 shown security features supported by our scheme and other schemes.…”
Section: Performance Analysismentioning
confidence: 99%
“…In addition to these existing mobile payment protocols adopt WPKI for ensuring non repudiation property. Protocols proposed in the realm of M obile Payments [1][2][3][4][5][6][7][8] were formally verified using manual verification methods like BAN logic and SVO Logic but not with Automated Tools like Scyther [11] and AVISPA [12]. were successfully verified using AVISPA and Scyther Tools.…”
Section: Related Workmentioning
confidence: 99%
“…In the existing mobile payments solutions [1][2][3][4][5][6][7] client"s credentials are generated and stored in the in the memory of mobile phone and could be infected by viruses or can be maliciously replaced, does not ensure secure and reliable communication security, does not ensure end to end security in the application layer. In addition to these existing mobile payment protocols adopt WPKI for ensuring non repudiation property.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation