English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113318/144297 (79%)
Visitors : 50950245      Online Users : 942
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/63213
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/63213


    Title: 利用基於身份的加密系統預防手機小額付款詐騙
    Prevention of Micropayment Scam based on Identity-Based Encryption
    Authors: 林宜盈
    Lin,Yi Ying
    Contributors: 左瑞麟
    Tso, Ray Lin
    林宜盈
    Lin,Yi Ying
    Keywords: 小額付費
    詐騙
    基於身份之密碼系統
    手機簡訊攔截
    Date: 2013
    Issue Date: 2014-01-02 14:06:52 (UTC+8)
    Abstract: 小額付款為電信業者預設開通功能,也就是使用者不須特別提出申請,就可以直接開通使用。小額付款的美意主要是為了取代小額的現金交易,增加民眾的便利性,但卻被詐騙集團利用,成為新興的詐騙手法。有網路罪犯疑似利用惡意app誘導用戶下載,等用戶下載安裝後,網路罪犯便開始擷取用戶的手機資訊,甚至攔截「小額付款」的通知簡訊,讓手機用戶在收到次期帳單後才發現莫名被消費。本篇論文將針對利用手機APP後門攔截簡訊刷小額付款提出改善方法,利用基於身份的加密系統(Identity-Based Encryption)將簡訊加密,使用者收到簡訊時,必須使用向電信公司所申請的「簡訊解密」APP才能解密讀取簡訊,這可有效解決攔截簡訊之問題,即使攻擊者攔截到簡訊,也會因為沒有解密金鑰而無法順利讀取簡訊。另外,解密金鑰利用通行碼(password)加密,所以亦不用擔心金鑰外洩之問題。由效能分析得知,將簡訊加密, 對送信方與收信方而言,其通訊成本(communication cost)與計算成本(computation cost)並不會產生太大之影響。此研究不僅可以解決攔截簡訊刷小額付款問題,其餘的重要資料的傳輸,例如:傳送用戶密碼、傳送用戶個人資料、傳送用戶金融帳戶資訊等,只要將簡訊加密,這些資料即使被攻擊者惡意攔截,也無法輕易讀取簡訊內容。
    Micropayment is the default available function opened by the telecom operators, that is, users can directly use it without making an application specially. The micropayment is mainly to replace cash transaction involving a small sum of money, so as to bring more convenience to users. However, it may be utilized by frauds, which becomes a new scam means. Some cyber-criminals are suspected to induce users to download malicious APPs. After the users download and install them, the cyber-criminals will start to retrieve users’ mobile phone information, even intercept notification SMS sent from micropayment. Consequently, until the mobile phone users receive the bill in the next term do they find the unknown payments. This paper will put forward a method to prevent intercepting the micropayment notification SMS by using the malicious APP installed on the mobile phone. It encrypts the SMS by Identity-based Public Key Cryptosystem. After the users receive the SMS, they must decrypt to read the message by using the “SMS Decryption” APP applied from the telecom company. In this way, it can effectively solve the problem of SMS interception. The attackers cannot successfully read the content without the decryption key even if they intercept the text messages. In addition, the decryption key is encrypted by password, thus users do not need to worry about the information leakage. The performance analysis shows that encrypting the text messages will not have a big effect on communication cost and computation cost of senders and receivers. This research cannot only solve the problem of swiping micropayment by SMS interception, but also protect the transmission of other important data.
    Reference: [1] 王正萍,線上小額付款機制簡介,電子商務導航,第五卷第19期,P1-7,2003年。
    [2] 闕仁斌,線上遊戲玩家使用電信小額付款服務接受度暨行銷模式之探討,國立台灣科技大學資訊管理學系碩士論文,P8-11,2009年。
    [3] Garena網頁
    http://forum.garena.tw/showthread.php?t=3422301
    http://forum.garena.tw/showthread.php?t=3422557
    http://forum.garena.tw/showthread.php?t=3422280
    [4] 中華電信網站
    https://aaaservice.hinet.net/User/user_tele.htm
    https://aaaservice.hinet.net/User/user_839.htm
    https://aaaservice.hinet.net/User/user_use.htm
    [5] 亞太電信網站-小額付費流程
    http://www.aptg.com.tw/Home/A_01_04_02_MicroPaymentHowTo.htm
    [6] Koblitz, N. "Elliptic Curve Cryptosystems", Mathematics of Computation, Vol. 48, pp. 203-209, 1987.
    [7] Miller, S. Victor. "Uses of elliptic curves in cryptography" , Advances in Cryptology-proceedings of Crypto’85, Lecture Notes in Computer Science, vol. 218, pp. 417-426, 1986.
    [8] 楊中皇,網路安全:理論與實務(第二版),第六章 橢圓曲線密碼系統,2008年
    [9] 陳宗保,行動電子商務環境下安全協定之研究,大葉大學資訊管理學系碩士論文,P28-30,P35-40,2001年。
    [10] 陳柏諭,身份認證與免憑證式金鑰交換協議之研究,亞洲大學資訊多媒體應用學系碩士論文,P16-26,2012年。
    [11] 詹益誌,在pairing 上一個有效率的基於身份碼認證的三人多把金鑰協議協定,中興大學資訊科學系碩士論文,P9-16,2005年。
    [12] 曾輔國,Halo:適用於同儕網路中機會性合作的階層式身份基礎公鑰系統,交通大學資訊科學與工程系碩士論文,P4-12,2008年。
    [13] Menezes, A. and Vanstone, S."Elliptic curve cryptosystems and their implementation",Journal of Cryptology, pp.209-224, 1993.
    [14] 王偲穎,動態會議金鑰分配機制之研究,世新大學資訊管理學系碩士論文,P9-12,2005年。
    [15] 莊耘坤,可調式家用網路身分認證方法之研究,世新大學資訊管理學系碩士論文,P38-40,2008年。
    [16] 楊順發,應用於銀行聯盟互運之電子小額付款機制,國立台灣科技大學資訊管理學系碩士論文,P13-15,2005年。
    [17] 楊朝麟,數位簽章非對稱潛隱通道之設計,成功大學資訊工程學系碩士論文,P7-8,2006年。
    [18] Shamir, A."Identity-based cryptosystems and signature schemes, "Advances in Cryptology: Crypto’84, Springer-Verlag, pp.47-53,1985.
    [19] Boneh, D. and Franklin, M. “Identity-Based Encryption from the Weil Pairing,” Proceedings of CRYPT’01, Lecture Notes in Computer Science, vol. 2139, pp. 213-229, 2001.
    [20] 呂奕慰,利用群體盲目簽章實現電子付款機制,雲林科技大學電子與資訊工程系碩士論文,P23-26,2003年。
    [21] 亞太信息-IBE加密演算法介紹
    http://www.sunnyfiber.com.tw/Proofpoint%E5%8A%A0%E5%AF%86%E6%8A%80%E8%A1%93%E8%AA%AA%E6%98%8E%E7%99%BD%E7%9A%AE%E6%9B%B8.pdf
    [22] 內政部警政署-165反詐騙網站
    http://www.165.gov.tw/
    http://165.gov.tw/fraud.aspx?id=21
    [23] 中時電子報
    http://news.chinatimes.com/society/130503/132012120601131.html
    [24] 李寧,王者歸來:Android 開發權威指南,第十章 全域事件──廣播,2011年。
    [25] 甘凱文,PIC_SERVER教材(13)-如何以PIC_SERVER收發手機簡訊,P1-2,2005年。
    [26] Cheng, P. Gu, Y. Lv, Z. Wang, J. Zhu, W. Chen, Z. Huang, J. "A Performance Analysis of Identity-Based Encryption Schemes. ", Trusted Systems Lecture Notes in Computer Science ,Vol. 7222, pp.289-303, 2012.
    Description: 碩士
    國立政治大學
    資訊科學學系
    99971013
    102
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0099971013
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML2218View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback