Filters








449 Hits in 6.7 sec

A New Authentication Protocol for Portable Communication Systems [chapter]

Sheng-bo Xu, Cees Jansen, Henk Tilborg
1999 Secure Information Networks  
, robust user identity confidentiality and non-repudiation services.  ...  Motivated by these new security requirements, this article analyzes the security of authentication protocols in several mobile communication industry standards, such as DAMPS, GSM, and TETRA, and several  ...  As for the non-repudiation of services, MS can use Kmh to produce an undeniable response and insert it into the request of services.  ... 
doi:10.1007/978-0-387-35568-9_15 fatcat:u2lc4euylfdojhvtfain3qrgky

PERFORMANCE ANALYSIS OF THE CONFIDENTIALITY SECURITY SERVICE IN CAN

Miguel León Chávez, Francisco Rodríguez Henríquez
2005 IFAC Proceedings Volumes  
Regarding security currently CAN only supports a special kind of service, namely safety, of data transfers for error detection, signaling, and self checking.  ...  This paper addresses the security service infrastructure included in the Controller Area Network (CAN), proposing the incorporation of the confidentiality service for that kind of network.  ...  ACKNOWLEDGMENTS This research project has been partially supported by the CONACyT project 45306.  ... 
doi:10.3182/20050703-6-cz-1902.01937 fatcat:qbybi6qqxrd6fcetjbc5uvuymi

Efficient Data Delivery For Secured Communication in Vanet

Neha Verma
2012 IOSR Journal of Computer Engineering  
The objective of combo algorithm is to achieve the principle of confidentiality, integrity, authentication and non-repudiation.  ...  With the use of GSM technique, the authentication and confidentiality services have been achieved. Also, data transmitted in the form of voice and packets, and secure communication will takes place.  ...  Non-repudiation: In this security service a sender or receiver can not repudiates the fact having sent the message. 5.  ... 
doi:10.9790/0661-0220108 fatcat:z6poauwa4bhynpd2xoa3bkozma

A Robust Authentication Protocol with Non-Repudiation Service for Integrating WLAN and 3G Network

Chou-Chen Yang, Ya-Wen Yang, Wei-Ting Liu
2006 Wireless personal communications  
In this paper, we propose a robust and efficient authentication protocol which can perform localized re-authentication procedure and provide non-repudiation service.  ...  The authentication protocol employs HMAC, hash-chaining techniques, and publickey digital signature to achieve localized fast re-authentication and non-repudiation service.  ...  Acknowledgements This work is supported by the National Science Council of the Republic of China under grants NSC93-2213-E-005-033.  ... 
doi:10.1007/s11277-006-9090-1 fatcat:34rmspudhjbvpdsqvmnt2efvw4

On the security of wireless network access with enhancements

Lein Harn, Wen-Jung Hsin
2003 Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03  
In this paper, we improve the security of the 3G protocols in network access by providing strong periodically mutual authentication, strong key agreement, and non-repudiation service in a simple and elegant  ...  The security of the current 3G wireless protocols addresses the problems faced by the 2G systems, in addition to fulfilling the higher 3G security requirements mandated from operating in IP networks as  ...  John Cigas at Rockhurst University for their constructive comments in the initial draft of this paper.  ... 
doi:10.1145/941311.941325 dblp:conf/ws/HarnH03 fatcat:gdspc7pzlzf7dl53cfyepod3pi

On the security of wireless network access with enhancements

Lein Harn, Wen-Jung Hsin
2003 Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03  
In this paper, we improve the security of the 3G protocols in network access by providing strong periodically mutual authentication, strong key agreement, and non-repudiation service in a simple and elegant  ...  The security of the current 3G wireless protocols addresses the problems faced by the 2G systems, in addition to fulfilling the higher 3G security requirements mandated from operating in IP networks as  ...  John Cigas at Rockhurst University for their constructive comments in the initial draft of this paper.  ... 
doi:10.1145/941322.941325 fatcat:cxwa47zyvja6nadhcyrt73a2wy

SSMS - A secure SMS messaging protocol for the m-payment systems

M. Toorani, A. Beheshti
2008 2008 IEEE Symposium on Computers and Communications  
The short message service (SMS) is one of its superior and well-tried services with a global availability in the GSM networks.  ...  SSMS efficiently embeds the confidentiality, integrity, authentication, and non-repudiation in the SMS messages.  ...  Data confidentiality, integrity, authentication, and non-repudiation are the most important security services in the security criteria that should be taken into account in many secure applications.  ... 
doi:10.1109/iscc.2008.4625610 dblp:conf/iscc/TooraniS08 fatcat:ruuixvzra5concrtzgsm5qlf3u

3G and WLAN Interworking Security: Current Status and Key

Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
2006 International Journal of Network Security  
However, while integrating WLAN and 3G, there are still some problems that should be considered in terms of authentication and security (such as billing, service continuity and authentication delay).  ...  From the users' point of view, the Integration of WLAN and 3G systems will provide a convenient and attractive way for the user to access network.  ...  Acknowledgements This research was partially supported by the National Science Council, Taiwan, R.O.C., under contract no.: NSC93-2213-E-005-033.  ... 
dblp:journals/ijnsec/YangCY06 fatcat:zmvdi4d47je75gm77mhsdezmne

Security in Next Generation Mobile Payment Systems: A Comprehensive Survey [article]

Waqas Ahmed, Amir Rasool, Neeraj Kumar, Abdul RehmanJaved, Thippa Reddy Gadekallu, Zunera Jalil, Natalia Kryvinska
2021 arXiv   pre-print
Mobile phones have become an inseparable friend for many users, serving much more than just communication tools.  ...  With the rise and advancements of mobile-specific security, threats are evolving as well. In this paper, we provide a survey of various security models for mobile phones.  ...  Security analysis comprise of various services: Authentication, Mutual Authentication, Integrity, Customer Anonymity and Non Repudiation. Figure 8 the overall service hierarchy of m-payment system.  ... 
arXiv:2105.12097v2 fatcat:3hs47xrubvav7mixzfadepkcge

Authentication protocols for personal communication systems

Hung-Yu Lin, Lein Harn
1995 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '95  
The subscriber's identity is not well protected in most protocols, and appropriate mechanisms solving disputes on roaming bills are not supported either.  ...  However, the strength of these protocols is usually weakened in the roaming environment where the security breach of a visited network could lead to persistent damages to subscribers who visit.  ...  Here we summarize the properties of the new protocols: • Non-repudiation of the service by roamers. • Incorrect bill cannot be charged on roamers.  ... 
doi:10.1145/217382.217456 dblp:conf/sigcomm/LinH95 fatcat:z5pzvojkdne7ddtqmd3ej3vlvq

Authentication protocols for personal communication systems

Hung-Yu Lin, Lein Harn
1995 Computer communication review  
The subscriber's identity is not well protected in most protocols, and appropriate mechanisms solving disputes on roaming bills are not supported either.  ...  However, the strength of these protocols is usually weakened in the roaming environment where the security breach of a visited network could lead to persistent damages to subscribers who visit.  ...  Here we summarize the properties of the new protocols: • Non-repudiation of the service by roamers. • Incorrect bill cannot be charged on roamers.  ... 
doi:10.1145/217391.217456 fatcat:ugaqoqejmfc6xco3ragjhgdyrq

A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges

Godfrey Anuga Akpakwu, Bruno J. Silva, Gerhard P. Hancke, Adnan M. Abu-Mahfouz
2018 IEEE Access  
Furthermore, 5G new radio enhancements for new service requirements and enabling technologies for the IoT are introduced.  ...  In addition, the third generation partnership project cellular-based low-power wide area solutions to support and enable the new service requirements for Massive to Critical IoT use cases are discussed  ...  This technology is an enhancement for LTE networks to support MTC for the IoT.  ... 
doi:10.1109/access.2017.2779844 fatcat:dfnk4oe2ifhqrnbn3gk6td64wy

A Sidelink-Aided Approach for Secure Multicast Service Delivery: From Human-Oriented Multimedia Traffic to Machine Type Communications

Sara Pizzi, Chiara Suraci, Antonio Iera, Antonella Molinaro, Giuseppe Araniti
2020 IEEE transactions on broadcasting  
This work proposes a protocol for the efficient and reliable management of multicast services in a 5G-oriented IoT scenario, in which security is a crucial requirement to be met.  ...  The proposed protocol is tailored to Narrowband IoT (NB-IoT) and makes use of D2D communications with the aim of improving network efficiency and optimizing network resource utilization.  ...  10 meaningful performance improvement it can bring, future research work will be tailored to the definition of a more accurate and realistic model for evaluating nodes' reliability.  ... 
doi:10.1109/tbc.2020.2977512 fatcat:mnxbzdydwfdifbwvxrqx6yid5e

Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication [chapter]

Walter Bamberger, Oliver Welter, Stephan Spitz
2007 Lecture Notes in Computer Science  
We consider mobile phones as an appropriate trusted gateway for external machines with low communication needs.  ...  The trustworthiness of the mobile phone is achieved by using the SIM as a secure storage and computing module.  ...  non-repudiation key.  ... 
doi:10.1007/978-3-540-72354-7_15 fatcat:qw7s42hxtfbrxgxoljj6vrxqqa

Interoperable Mobile Payment — A Requirements-Based Architecture [chapter]

Manfred Männle
2003 Wirtschaftsinformatik 2003/Band I  
This paper presents a mobile payment architecture that combines the security and strong user authentication of GSM networks, the cost efficiency of micropayment, and the flexibility and world wide acceptance  ...  of existing macropayment schemes.  ...  Measures for integrity, non-repudiation, confidentiality, and persistence further reduce the number of disputes and increase consumer trust. • Anonymity The consumer prefers anonymous payments, which is  ... 
doi:10.1007/978-3-642-57444-3_6 fatcat:xz3pvcaayvfcpn7uks47sx4wcu
« Previous Showing results 1 — 15 out of 449 results