A PK-SIM card based end-to-end security framework for SMS

被引:19
作者
He Rongyu [1 ,2 ]
Zhao Guolei [2 ]
Chang Chaowen [1 ,2 ]
Me Hui [2 ]
Qin Xi [2 ]
Qin Zheng [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[2] Informat Engn Univ, Sch Elect Technol, Zhengzhou 450004, Peoples R China
关键词
Public Key Infrastructure (PKI); End-to-end security; PK-SIM card; Session key; Primary key; AUTHENTICATION; EFFICIENT;
D O I
10.1016/j.csi.2008.06.011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Since the first SMS (Short Message Services) message was sent in the UK in 1992, the SIMS has become a mass Communication tool and has been broadly used in mobile business applications. But the security issue of the SMS has often been considered as a crucial barrier to its application in many fields that need strong authentication and confidentiality, such as mobile-commerce. The Subscriber Identity Module (SIM) inside mobile phones is a tamper resistant device which contains strong authentication mechanism and has been used in remote user authentication system, e.g. WIM1 card in Wireless Application Protocol (WAP). In this contribution. we design and realize a Secure SIM card, named PK-SIM card, which is a standard SIM card with additional PKI functionality; based on the PK-SIM card, we present a security framework offering solutions for the development of secure mobile business applications using SMS as bearer. The security framework consists of a client device, in which a PK-SIM card is used to store security credentials, a Secure Access Gateway (SAG) which is used to receive and send secure SMS messages, a trusted third-party, Certification Authority (CA), which provides a public-key certification service and a Mobile Operator which provides the communication infrastructure for the SMS. Then we propose an authentication and session key distribution protocol which provides end-to-end security between the PK-SIM card and the SAG, and give a formal security analysis to the proposed protocol based on BAN authentication logic(2). Lastly, we provide a typical application of the security framework in Mobile Police Information System. The evaluations of the system have proved that the security framework is suitable for actual needs both in speed and security. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:629 / 641
页数:13
相关论文
共 29 条
[1]   Toward SSL integration in SIM SmartCards [J].
Badra, M ;
Urien, P .
2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, :889-894
[2]  
BIRYUKOV A, 2000, REAL TIME CRYPTANALY
[3]  
BURROWS M, 1990, ACM T COMPUTER SYSTE, V8
[4]  
Chanson S., 2001, P 2 INT C WEB INF SY, V1, P3
[5]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[6]  
CHIEN HY, 2003, J SYST SOFTWARE, V67
[7]  
COLLESEI S, 1994, 5 IEEE INT S PERS IN, P939
[8]   A security framework for mobile-to-mobile payment network [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, :420-423
[9]  
Farrell StepPhen, 2000, INFORM SECURITY TECH, V5, P23
[10]   Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration [J].
Grecas, CF ;
Maniatis, SI ;
Venieris, IS .
MOBILE NETWORKS & APPLICATIONS, 2003, 8 (02) :145-150