Secure and efficient public key management in next generation mobile networks

Kyusuk Han, Hyeran Mun, Taeshik Shon, Chan Yeob Yeun, James J. Park

Research output: Contribution to journalArticlepeer-review

9 Scopus citations

Abstract

Employing public key-based security architecture is inevitable for the advanced security applications in the mobile networks. However, key storage management problems have arisen, because the public key computation is still the large overhead to USIM, and the mobile equipment has potential threats of the key leakage or loss. In order to solve such shortcomings, we improve the keyinsulated models and propose "Trust Delegation" model that the overall security computations are operated in ME, while the initial private key still remains in the secure storage in USIM. Our model is resilient against not only key exposure but also key loss. Finally, we show that the overall transactions can be reduced to one-third than current 3GPP Generic Authentication Architecture.

Original languageBritish English
Pages (from-to)677-685
Number of pages9
JournalPersonal and Ubiquitous Computing
Volume16
Issue number6
DOIs
StatePublished - Aug 2012

Keywords

  • 3GPP
  • Generic authentication architecture
  • ID-based cryptosystem
  • Mobile network
  • Security architecture

Fingerprint

Dive into the research topics of 'Secure and efficient public key management in next generation mobile networks'. Together they form a unique fingerprint.

Cite this