53
Mobile Commerce Mobile Commerce CMSC 466/666 CMSC 466/666 UMBC UMBC

Cmsc666 Mc

Embed Size (px)

Citation preview

Page 1: Cmsc666 Mc

Mobile Mobile CommerceCommerce

CMSC 466/666CMSC 466/666

UMBCUMBC

Page 2: Cmsc666 Mc

OutlineOutline

M-Commerce OverviewM-Commerce Overview InfrastructureInfrastructure M-Commerce ApplicationsM-Commerce Applications Mobile PaymentMobile Payment LimitationsLimitations Security in M-CommerceSecurity in M-Commerce

Page 3: Cmsc666 Mc

Mobile Commerce: Mobile Commerce: OverviewOverview

Mobile commerce (m-commerce, Mobile commerce (m-commerce,

m-business)—anym-business)—any e-commerce done e-commerce done in a wireless environment, especially in a wireless environment, especially via the Internetvia the Internet Can be done via the Internet, private Can be done via the Internet, private

communication lines, smart cards, etc.communication lines, smart cards, etc. Creates opportunity to deliver new Creates opportunity to deliver new

services to existing customers and to services to existing customers and to attract new onesattract new ones

Page 4: Cmsc666 Mc

Mobile commerce from the Mobile commerce from the Customer‘s point of viewCustomer‘s point of view

The customer wants to access information, The customer wants to access information, goods and services any time and in any place goods and services any time and in any place on his mobile device.on his mobile device.

He can use his mobile device to purchase He can use his mobile device to purchase tickets for events or public transport, pay for tickets for events or public transport, pay for parking, download content and even order parking, download content and even order books and CDs. books and CDs.

He should be offered appropriate payment He should be offered appropriate payment methods. They can range from secure mobile methods. They can range from secure mobile micropayment to service subscriptions.micropayment to service subscriptions.

Page 5: Cmsc666 Mc

Mobile commerce from the Mobile commerce from the Provider‘s point ofProvider‘s point of viewview

The future development of the mobile telecommunication The future development of the mobile telecommunication sector is heading more and more towards value-added sector is heading more and more towards value-added services. Analysts forecast that soon half of mobile operators‘ services. Analysts forecast that soon half of mobile operators‘ revenue will be earned through mobile commerce. revenue will be earned through mobile commerce.

Consequently operators as well as third party providers will Consequently operators as well as third party providers will focus on value-added-services. To enable mobile services, focus on value-added-services. To enable mobile services, providers with expertise on different sectors will have to providers with expertise on different sectors will have to cooperate.cooperate.

Innovative service scenarios will be needed that meet the Innovative service scenarios will be needed that meet the customer‘s expectations and business models that satisfy all customer‘s expectations and business models that satisfy all partners involved.partners involved.

Page 6: Cmsc666 Mc

M-Commerce M-Commerce TerminologyTerminology

GenerationsGenerations 1G: 1979-1992 wireless technology1G: 1979-1992 wireless technology 2G: current wireless technology; mainly 2G: current wireless technology; mainly

accommodates textaccommodates text 2.5G: interim technology accommodates 2.5G: interim technology accommodates

graphicsgraphics 3G: 33G: 3rdrd generation technology (2001- generation technology (2001-

2005) supports rich media (video clips)2005) supports rich media (video clips) 4G: will provide faster multimedia display 4G: will provide faster multimedia display

(2006-2010)(2006-2010)

Page 7: Cmsc666 Mc

Terminology and Terminology and StandardsStandards

GPS: Satellite-based Global Positioning GPS: Satellite-based Global Positioning SystemSystem

PDA: Personal Digital Assistant—handheld PDA: Personal Digital Assistant—handheld wireless computerwireless computer

SMS: Short Message ServiceSMS: Short Message Service EMS: Enhanced Messaging ServiceEMS: Enhanced Messaging Service MMS: Multimedia Messaging ServiceMMS: Multimedia Messaging Service WAP: Wireless Application ProtocolWAP: Wireless Application Protocol Smartphones—Internet-enabled cell phones Smartphones—Internet-enabled cell phones

with attached applicationswith attached applications

Page 8: Cmsc666 Mc

Attributes of M-Commerce Attributes of M-Commerce and Its Economic and Its Economic

AdvantagesAdvantages Mobility—users carry cell phones or other mobile Mobility—users carry cell phones or other mobile devicesdevices

Broad reach—people can be reached at any timeBroad reach—people can be reached at any time Ubiquity—easier information access in real-timeUbiquity—easier information access in real-time Convenience—devices that store data and have Convenience—devices that store data and have

Internet, intranet, extranet connectionsInternet, intranet, extranet connections Instant connectivity—easy and quick connection to Instant connectivity—easy and quick connection to

Internet, intranets, other mobile devices, databasesInternet, intranets, other mobile devices, databases Personalization—preparation of information for Personalization—preparation of information for

individual consumersindividual consumers Localization of products and services—knowing where Localization of products and services—knowing where

the user is located at any given time and match the user is located at any given time and match service to themservice to them

Page 9: Cmsc666 Mc

OutlineOutline

M-CommerceM-Commerce InfrastructureInfrastructure M-Commerce ApplicationsM-Commerce Applications Mobile PaymentMobile Payment LimitationsLimitations Security in M-CommerceSecurity in M-Commerce

Page 10: Cmsc666 Mc

Mobile Computing Mobile Computing InfrastructureInfrastructure

Screenphones—a Screenphones—a telephone equipped telephone equipped with color screen, with color screen, keyboard, e-mail, keyboard, e-mail, and Internet and Internet capabilitiescapabilities

E-mail handheldsE-mail handhelds Wirelined—Wirelined—

connected by wires connected by wires to a networkto a network

Cellular (mobile) Cellular (mobile) phonesphones

Attachable keyboardAttachable keyboard PDAsPDAs Interactive pagersInteractive pagers Other devicesOther devices

NotebooksNotebooks HandheldsHandhelds SmartpadsSmartpads

Hardware

Page 11: Cmsc666 Mc

Mobile Computing Mobile Computing InfrastructureInfrastructure

(cont.)(cont.) Unseen infrastructure requirementsUnseen infrastructure requirements

Suitably configured wireline or wireless Suitably configured wireline or wireless WAN modemWAN modem

Web server with wireless supportWeb server with wireless support Application or database serverApplication or database server Large enterprise application serverLarge enterprise application server GPS locator used to determine the GPS locator used to determine the

location of mobile computing device location of mobile computing device carriercarrier

Page 12: Cmsc666 Mc

Mobile Computing Mobile Computing Infrastructure Infrastructure (cont.)(cont.)

SoftwareSoftware MicrobrowserMicrobrowser Mobile client operating system (OS)Mobile client operating system (OS) Bluetooth—a chip technology and WPAN Bluetooth—a chip technology and WPAN

standard that enables voice and data standard that enables voice and data communications between wireless devices communications between wireless devices over short-range radio frequency (RF)over short-range radio frequency (RF)

Mobile application user interfaceMobile application user interface Back-end legacy application softwareBack-end legacy application software Application middlewareApplication middleware Wireless middlewareWireless middleware

Page 13: Cmsc666 Mc

Mobile Computing Mobile Computing Infrastructure Infrastructure (cont.)(cont.)

Networks and accessNetworks and access Wireless transmission mediaWireless transmission media

MicrowaveMicrowave SatellitesSatellites RadioRadio InfraredInfrared Cellular radio technologyCellular radio technology

Wireless systemsWireless systems

Page 14: Cmsc666 Mc

OutlineOutline

M-Commerce OverviewM-Commerce Overview InfrastructureInfrastructure M-Commerce ApplicationsM-Commerce Applications Mobile PaymentMobile Payment LimitationsLimitations Security in M-CommerceSecurity in M-Commerce

Page 15: Cmsc666 Mc

Mobile Service ScenariosMobile Service Scenarios Financial Services.Financial Services.

Entertainment.Entertainment.

Shopping.Shopping.

Information Services.Information Services.

Payment.Payment.

Advertising.Advertising. And more ...And more ...

Page 16: Cmsc666 Mc

Early content and applications have all been geared Early content and applications have all been geared around information delivery but as time moves on the around information delivery but as time moves on the

accent will be on revenue generation.accent will be on revenue generation.

M- commerce

Entertainment• Music• Games• Graphics• Video• Pornography

Communications• Short Messaging• Multimedia Messaging• Unified Messaging• e-mail• Chatrooms• Video - conferencing

Transactions• Banking• Broking• Shopping• Auctions• Betting• Booking & reservations• Mobile wallet• Mobile purse

Information• News• City guides• Directory Services• Maps• Traffic and weather• Corporate information• Market data

Page 17: Cmsc666 Mc

Classes of M-Commerce Classes of M-Commerce ApplicationsApplications

Page 18: Cmsc666 Mc

Mobile Application: Mobile Application: Financial ToolFinancial Tool

As mobile devices become more As mobile devices become more securesecure

Mobile bankingMobile banking Bill payment servicesBill payment services M-brokerage servicesM-brokerage services Mobile money transfersMobile money transfers Mobile micropaymentsMobile micropayments

Replace ATM’s and credit cards??Replace ATM’s and credit cards??

Page 19: Cmsc666 Mc

Financial Tool: Financial Tool: Wireless Electronic Payment SystemsWireless Electronic Payment Systems

““transform mobile phones into transform mobile phones into secure, self-contained purchasing secure, self-contained purchasing tools capable of instantly tools capable of instantly authorizing payments…”authorizing payments…”

Types:Types: MicropaymentsMicropayments Wireless wallets (m-wallet)Wireless wallets (m-wallet) Bill paymentsBill payments

Page 20: Cmsc666 Mc

ExamplesExamples

Swedish Postal BankSwedish Postal Bank Check Balances/Make Payments & Check Balances/Make Payments &

Conduct some transactionsConduct some transactions Dagens IndustriDagens Industri

Receive Financial Data and Trade on Receive Financial Data and Trade on Stockholm ExchangeStockholm Exchange

CitibankCitibank Access balances, pay bills & transfer Access balances, pay bills & transfer

funds using SMSfunds using SMS

Page 21: Cmsc666 Mc

Mobile Applications : Marketing, Advertising, Mobile Applications : Marketing, Advertising, And Customer ServiceAnd Customer Service

Shopping from Wireless DevicesShopping from Wireless Devices Have access to services similar to those Have access to services similar to those

of wireline shoppersof wireline shoppers Shopping cartsShopping carts Price comparisonsPrice comparisons Order statusOrder status

FutureFuture Will be able to view and purchase products Will be able to view and purchase products

using handheld mobile devicesusing handheld mobile devices

Page 22: Cmsc666 Mc

Mobile Applications : Marketing, Mobile Applications : Marketing, Advertising, And Customer ServiceAdvertising, And Customer Service

Targeted AdvertisingTargeted Advertising Using demographic information can Using demographic information can

personalize wireless services personalize wireless services (barnesandnoble.com)(barnesandnoble.com)

Knowing users’ preferences and surfing Knowing users’ preferences and surfing habits marketers can send:habits marketers can send: User-specific advertising messagesUser-specific advertising messages Location-specific advertising messagesLocation-specific advertising messages

Page 23: Cmsc666 Mc

Mobile Applications : Marketing, Mobile Applications : Marketing, Advertising, And Customer ServiceAdvertising, And Customer Service

CRM applicationsCRM applications MobileCRMMobileCRM Comparison shopping using Internet Comparison shopping using Internet

capable phonescapable phones Voice PortalsVoice Portals

Enhanced customer service improved Enhanced customer service improved access to data for employeesaccess to data for employees

Page 24: Cmsc666 Mc

Mobile PortalsMobile Portals

““A customer interaction channel that A customer interaction channel that aggregates content and services for aggregates content and services for mobile users.”mobile users.” Charge per time for service or Charge per time for service or

subscription basedsubscription based Example: I-Mode in JapanExample: I-Mode in Japan

Mobile corporate portalMobile corporate portal Serves corporations customers and Serves corporations customers and

supplierssuppliers

Page 25: Cmsc666 Mc

Mobile Intrabusiness and Enterprise Mobile Intrabusiness and Enterprise ApplicationsApplications

Support of Mobile EmployeesSupport of Mobile Employees by 2005 25% of all workers could be mobile by 2005 25% of all workers could be mobile

employeesemployees sales people in the field, traveling sales people in the field, traveling

executives, telecommuters, consultants executives, telecommuters, consultants working on-site, repair or installation working on-site, repair or installation employeesemployees

need same corporate data as those need same corporate data as those working inside company’s officesworking inside company’s offices

solution: wireless devicessolution: wireless devices wearable devices: cameras, screen, wearable devices: cameras, screen,

keyboard, touch-panel displaykeyboard, touch-panel display

Page 26: Cmsc666 Mc

Mobile B2B and Supply Chain Mobile B2B and Supply Chain ApplicationsApplications

““mobile computing solutions enable organizations to mobile computing solutions enable organizations to respond faster to supply chain disruptions by respond faster to supply chain disruptions by proactively adjusting plans or shifting resources proactively adjusting plans or shifting resources related to critical supply chain events as they occur.”related to critical supply chain events as they occur.” accurate and timely informationaccurate and timely information opportunity to collaborate along supply chainopportunity to collaborate along supply chain must integrate mobile devices into information must integrate mobile devices into information

exchangesexchanges example: “telemetry” integration of wireless example: “telemetry” integration of wireless

communications, vehicle monitoring systems, and communications, vehicle monitoring systems, and vehicle location devicesvehicle location devices

leads to reduced overhead and faster service leads to reduced overhead and faster service responsiveness (vending machines)responsiveness (vending machines)

Page 27: Cmsc666 Mc

Applications of Mobile Devices for Applications of Mobile Devices for Consumers/IndustriesConsumers/Industries

Personal Service ApplicationsPersonal Service Applications example airportexample airport

Mobile Gaming and GamblingMobile Gaming and Gambling Mobile EntertainmentMobile Entertainment

music and videomusic and video HotelsHotels Intelligent Homes and AppliancesIntelligent Homes and Appliances Wireless TelemedicineWireless Telemedicine Other Services for ConsumersOther Services for Consumers

Page 28: Cmsc666 Mc

OutlineOutline

M-Commerce OverviewM-Commerce Overview InfrastructureInfrastructure M-Commerce ApplicationsM-Commerce Applications Mobile PaymentMobile Payment LimitationsLimitations Security in M-CommerceSecurity in M-Commerce

Page 29: Cmsc666 Mc

Mobile Payment for M-CommerceMobile Payment for M-Commerce

Mobile Payment can be offered as a stand-Mobile Payment can be offered as a stand-alone service.alone service.

Mobile Payment could also be an important Mobile Payment could also be an important enabling service for other m-commerce services enabling service for other m-commerce services (e.g. mobile ticketing, shopping, gambling…) : (e.g. mobile ticketing, shopping, gambling…) :

It could improve user acceptance by making the It could improve user acceptance by making the services more secure and user-friendly. services more secure and user-friendly.

In many cases offering mobile payment methods is In many cases offering mobile payment methods is the only chance the service providers have to gain the only chance the service providers have to gain revenue from an m-commerce service.revenue from an m-commerce service.

Page 30: Cmsc666 Mc

Mobile Payment (cont.)Mobile Payment (cont.)

the consumer must be informed of: what is being bought, and how much to pay options to pay;

the payment must be made payments must be traceable.

Page 31: Cmsc666 Mc

Mobile Payment (cont.)Mobile Payment (cont.)

Customer requirementsCustomer requirements:: a larger selection of merchants with whom they a larger selection of merchants with whom they

can tradecan trade a more consistent payment interface when a more consistent payment interface when

making the purchase with multiple payment making the purchase with multiple payment schemes, like:schemes, like:

• Credit Card paymentCredit Card payment• Bank Account/Debit Card Payment Bank Account/Debit Card Payment

Merchant benefits:Merchant benefits:• brands to offer a wider variety of paymentbrands to offer a wider variety of payment• Easy-to-use payment interface developmentEasy-to-use payment interface development

Bank and financial institution benefitsBank and financial institution benefits• to offer a consistent payment interface to to offer a consistent payment interface to

consumer and merchantsconsumer and merchants

Page 32: Cmsc666 Mc

Payment via Internet Payment via Internet Payment ProviderPayment Provider

WAP GW/Proxy

SSL tunnel

MeP

GSM Security

SMS-C

User

Browsing (negotiation)

Merchant

Mobile Wallet

CC/Bank

IPP

Page 33: Cmsc666 Mc

Payment via integrated Payment Payment via integrated Payment ServerServer

WAP GW/Proxy

ISO8583 BasedCP

Mobile CommerceServer

GSM Security

SMS-C

User

Browsing (negotiation)

CC/Bank

Merchant

Mobile Wallet

Voice PrePaid

VPP IF

SSL tunnel

Page 34: Cmsc666 Mc

OutlineOutline

M-Commerce OverviewM-Commerce Overview InfrastructureInfrastructure M-Commerce ApplicationsM-Commerce Applications Mobile PaymentMobile Payment LimitationsLimitations Security in M-CommerceSecurity in M-Commerce

Page 35: Cmsc666 Mc

Limitations of M-CommerceLimitations of M-Commerce

Usability ProblemUsability Problem small size of mobile devices (screens, small size of mobile devices (screens,

keyboards, etc)keyboards, etc) limited storage capacity of deviceslimited storage capacity of devices hard to browse siteshard to browse sites

Technical LimitationsTechnical Limitations lack of a standardized security protocollack of a standardized security protocol insufficient bandwidthinsufficient bandwidth 3G liscenses3G liscenses

Page 36: Cmsc666 Mc

Limitations of M-CommerceLimitations of M-Commerce

Technical Limitations…Technical Limitations… transmission and power consumption transmission and power consumption

limitationslimitations poor reception in tunnels and certain buildingspoor reception in tunnels and certain buildings multipath interference, weather, and terrain multipath interference, weather, and terrain

problems and distance-limited connectionsproblems and distance-limited connections

WAP LimitationsWAP Limitations SpeedSpeed CostCost AccessibilityAccessibility

Page 37: Cmsc666 Mc

Limiting technological Limiting technological factorsfactors

Mobile Devices•Battery•Memory•CPU•Display Size

Networks•Bandwidth•Interoperability•Cell Range•Roaming

Localisation•Upgrade of Network•Upgrade of Mobile Devices•Precision

Mobile Middleware•Standards•Distribution

Security•Mobile Device•Network•Gateway

Page 38: Cmsc666 Mc

Potential Health HazardsPotential Health Hazards

Cellular radio frequecies = cancer?Cellular radio frequecies = cancer? No conclusive evidence yetNo conclusive evidence yet could allow for myriad of lawsuitscould allow for myriad of lawsuits mobile devices may interfere with mobile devices may interfere with

sensitive medical devices such as sensitive medical devices such as pacemakerspacemakers

Page 39: Cmsc666 Mc

OutlineOutline

M-Commerce OverviewM-Commerce Overview InfrastructureInfrastructure M-Commerce ApplicationsM-Commerce Applications Mobile PaymentMobile Payment LimitationsLimitations Security in M-CommerceSecurity in M-Commerce

Page 40: Cmsc666 Mc

Security in M-Commerce: Security in M-Commerce: EnvironmentEnvironment

Operator centric modelOperator centric model

CA

Bank (FI)

Merchant

ContentAggregati

onInternet

SAT GW

WAP GW

MobileNetwork

Mobile Bank

WAP1.1(+SIM where avail.)

WAP1.2(WIM)

(SIM)

Security andSecurity andPaymentPayment

Mobile e-CommerceMobile e-CommerceServerServer

Mobile IPService

ProviderNetwork

Page 41: Cmsc666 Mc

WAP ArchitectureWAP Architecture

Web Server

Content

CGIScripts

etc.

WM

L D

ecks

wit

h W

ML

-Scr

ipt

WAP Gateway

WML Encoder

WMLScriptCompiler

Protocol Adapters

Client

WML

WML-Script

WTAI

Etc.

HTTPWSP/WTP

Page 42: Cmsc666 Mc

Comparison between Comparison between Internet and WAP Internet and WAP

technologiestechnologies

HTMLJavaScript

HTTP

TLS - SSL

TCP/IPUDP/IP

Wireless Application Protocol

Wireless ApplicationEnvironment (WAE)

Session Layer (WSP)

Security Layer (WTLS)

Transport Layer (WDP)

Other Services andApplications

Transaction Layer (WTP)

SMS USSD CSD IS-136 CDMA CDPD PDC-P Etc..

Bearers:

Page 43: Cmsc666 Mc

WAP RisksWAP Risks WAP GapWAP Gap

Claim: WTLS protects WAP as SSL Claim: WTLS protects WAP as SSL protects HTTPprotects HTTP

Problem: In the process of translating Problem: In the process of translating one protocol to another, information is one protocol to another, information is decrypted and re-encrypteddecrypted and re-encrypted Recall the Recall the WAP Architecture WAP Architecture

Solution: Doing decryption/re-encryption Solution: Doing decryption/re-encryption in the same process on the WAP gatewayin the same process on the WAP gateway

Wireless gateways as single point of Wireless gateways as single point of failurefailure

Page 44: Cmsc666 Mc

Platform RisksPlatform Risks

Without a secure OS, achieving security Without a secure OS, achieving security on mobile devices is almost impossibleon mobile devices is almost impossible

Learned lessons:Learned lessons: Memory protection of processesMemory protection of processes Protected kernel ringsProtected kernel rings File access controlFile access control Authentication of principles to resourcesAuthentication of principles to resources Differentiated user and process privilegesDifferentiated user and process privileges Sandboxes for untrusted codeSandboxes for untrusted code Biometric authentication Biometric authentication

Page 45: Cmsc666 Mc

WMLScriptWMLScript

Scripting is heavily used for client-side processing to offload servers and reduce demand on bandwidth

Wireless Markup Language (WML) is the equivalent to HTML, but derived from XML

WMLScript is WAP’s equivalent to JavaScript Derived from JavaScript™

Page 46: Cmsc666 Mc

WMLScript (cont.)WMLScript (cont.)

Integrated with WML Reduces network traffic

Has procedural logic, loops, conditionals, etc

Optimized for small-memory, small-CPU devices

Bytecode-based virtual machine Compiler in network Works with Wireless Telephony Application

(WTA) to provide telephony functions

Page 47: Cmsc666 Mc

Risks of WMLScript• Lack of Security Model Lack of Security Model

• Does not differentiate trusted local code from untrusted Does not differentiate trusted local code from untrusted code downloaded from the Internet. So, there is no access code downloaded from the Internet. So, there is no access control!!control!!

• WML Script is not type-safe.WML Script is not type-safe.

• Scripts can be scheduled to be pushed to the client device Scripts can be scheduled to be pushed to the client device without the user’s knowledgewithout the user’s knowledge

• Does not prevent access to persistent storageDoes not prevent access to persistent storage

• Possible attacks:Possible attacks:

• Theft or damage of personal informationTheft or damage of personal information

• Abusing user’s authentication informationAbusing user’s authentication information

• Maliciously offloading money saved on smart cardsMaliciously offloading money saved on smart cards

Page 48: Cmsc666 Mc

BluetoothBluetooth Bluetooth is the codename for a small, low-cost, Bluetooth is the codename for a small, low-cost,

short range wireless technology specification short range wireless technology specification Enables users to connect a wide range of Enables users to connect a wide range of

computing and telecommunication devices computing and telecommunication devices easily and simply, without the need to buy, easily and simply, without the need to buy, carry, or connect cables.carry, or connect cables.

Bluetooth enables mobile phones, computers Bluetooth enables mobile phones, computers and PDAs to connect with each other using and PDAs to connect with each other using short-range radio waves, allowing them to "talk" short-range radio waves, allowing them to "talk" to each otherto each other

It is also cheapIt is also cheap

Page 49: Cmsc666 Mc

Bluetooth SecurityBluetooth SecurityBluetooth provides security between any two Bluetooth devices for user protection and secrecy

mutual and unidirectional authentication encrypts data between two devices Session key generation

• configurable encryption key length• keys can be changed at any time during a connection

Authorization (whether device X is allowed to have access service Y)• Trusted Device: The device has been previously authenticated, a link key

is stored and the device is marked as “trusted” in the Device Database.

• Untrusted Device: The device has been previously authenticated, link key is stored but the device is not marked as “trusted” in the Device Database

• Unknown Device: No security information is available for this device. This is also an untrusted device.

automatic output power adaptation to reduce the range exactly to requirement, makes the system extremely difficult to eavesdrop

Page 50: Cmsc666 Mc

New Security RisksNew Security Risksin M-Commercein M-Commerce

• Abuse of cooperative nature of ad-hoc Abuse of cooperative nature of ad-hoc networksnetworks

• An adversary that compromises one node can An adversary that compromises one node can disseminate false routing information.disseminate false routing information.

• Malicious domainsMalicious domains

• A single malicious domain can compromise A single malicious domain can compromise devices by downloading malicious codedevices by downloading malicious code

• Roaming (are you going to the bad guys ?)Roaming (are you going to the bad guys ?)

• Users roam among non-trustworthy domainsUsers roam among non-trustworthy domains

Page 51: Cmsc666 Mc

New Security Risks New Security Risks (cont.)(cont.)

• Launching attacks from mobile devicesLaunching attacks from mobile devices

• With mobility, it is difficult to identify attackersWith mobility, it is difficult to identify attackers

• Loss or theft of deviceLoss or theft of device

• More private information than desktop computersMore private information than desktop computers

• Security keys might have been saved on the deviceSecurity keys might have been saved on the device

• Access to corporate systemsAccess to corporate systems

• BluetoothBluetooth provides security at the lower layers only: a provides security at the lower layers only: a stolen device can still be trustedstolen device can still be trusted

Page 52: Cmsc666 Mc

New Security Risks New Security Risks (cont.)(cont.)

• Problems with Wireless Transport Layer Security Problems with Wireless Transport Layer Security (WTLS) protocol(WTLS) protocol

• Security Classes:Security Classes:

• No certificatesNo certificates

• Server only certificate (Server only certificate (Most CommonMost Common))

• Server and client CertificatesServer and client Certificates

• Re-establishing connection without re-authenticationRe-establishing connection without re-authentication

• Requests can be redirected to malicious sitesRequests can be redirected to malicious sites

Page 53: Cmsc666 Mc

New Privacy RisksNew Privacy Risks

• Monitoring user’s private informationMonitoring user’s private information

• Offline telemarketingOffline telemarketing

• Who is going to read the “legal jargon”Who is going to read the “legal jargon”

• Value added services based on location Value added services based on location awareness (Location-Based Services)awareness (Location-Based Services)