Securing Mobile Phone Calls with Identity-Based Cryptography

نویسندگان

  • Matthew Smith
  • Christian Schridde
  • Björn Agel
  • Bernd Freisleben
چکیده

In this paper, an identity-based key agreement system and its implementation for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure. The proposed approach offers solutions to the problems of multi-domain key generation, key distribution, multi-domain public parameter distribution and inter-domain key agreement. The feasibility of the approach is illustrated by presenting experimental results based on a Symbian implementation running on N95-1 and N82-1 Nokia smartphones.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Achieving Security in Messaging and Personal Content in Symbian Phones

This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation and integrity. We used Identity Based Cryptography in order to secure the mobile messaging and Blowfish algori...

متن کامل

Implementation of IRIS recognition for Securing Online Payment

Iris Recognition is considered as the best among all the biometric security due to its high recognition rate, iris is unique for every human and even uncorrelated for twins. The proposed document focuses on implementing the iris recognition in online payment system by this users identity is more secured. Increase in the credit card fraudulent thefts needs further security for protecting them fr...

متن کامل

Mobile Electronic Identity: Securing Payment on Mobile Phones

The pervasive use of mobile phones has created a dynamic computing platform that a large percentage of the population carries routinely. There is a growing trend of integrating mobile phones with electronic identity, giving the phone the ability to prove or support the identity of the owner by containing, for example, a tuple of name, ID, photo and public key. While this helps phone owners prov...

متن کامل

Using Mobile Phone while Driving: A Simulator Study of a Dualtask Condition

Objectives: Most studies have performed to identify the affective variables in using mobile phone by drivers based on interview and questionnaire. In this study call answering rate while driving was investigated in a sample of male postgraduate students of a university in Tehran by a driving simulator. Methods: Six driving scenario designed differing in risk of driving. Answer rate to mobile...

متن کامل

LHIP – Lightweight Authentication for the Host Identity Protocol

The ubiquity of truly mobile appliances such as Wi-Fi-enabled mobile phones, PDAs, and Internet web pads stands in stark contrast to the lack of mobility support in today’s communication protocols. Many of these devices are multihomed and use standard protocols like IP and TCP, which have been designed for non-mobile computers with a single network device. Therefore, they are not able to cope w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009