Secure software download for programmable mobile user equipment

C. Y. Yeun, T. Farnham

Research output: Contribution to journalConference articlepeer-review

6 Scopus citations

Abstract

At present both symmetric and asymmetric cryptography have been proposed to provide secure software download. However, these approaches individually have some advantages and disadvantages. Asymmetric approaches are less efficient and more complex and require long key lengths to achieve the same level of security as the symmetric approach. On the other hand the symmetric approach requires secret keys to be stored within the terminal and does not provide non-repudiation or anonymous software download. Thus, our innovative approach will combine the two (symmetric and asymmetric) to provide secure software download for reconfigurable mobile equipment by using Public Key Infrastructure (PKI) technology to transport a symmetric session key. Our approach provides the following advantages: the ability to broadcast to multiple mobile terminals and provide anonymous software download. Also new anonymous software download techniques, based on this solution, enable secure software download for each terminal/client request such as downloading free software, tickets or coupons. X.509 and WPKI techniques combined with a symmetric solution could be one of the best ways to enable both secure software download as well as secure M-Commerce on mobile user equipment.

Original languageBritish English
Pages (from-to)505-510
Number of pages6
JournalIEE Conference Publication
Issue number489
DOIs
StatePublished - 2002
Event3rd International Conference on: 3G Mobile Communication Technologies - London, United Kingdom
Duration: 8 May 200210 May 2002

Fingerprint

Dive into the research topics of 'Secure software download for programmable mobile user equipment'. Together they form a unique fingerprint.

Cite this