期刊文献+

A Secure Short Message Communication Protocol 被引量:1

A Secure Short Message Communication Protocol
下载PDF
导出
摘要 According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway axe realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application. According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway axe realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.
出处 《International Journal of Automation and computing》 EI 2008年第2期202-207,共6页 国际自动化与计算杂志(英文版)
基金 This work was supported by the Mobile Police Project of China(No.J1GAB23W013) National High Technology Research and Development Program of China(863 Program,No.2007AA01Z479).
关键词 Short messaging service security protocol subscriber identity module (SIM) tool kit (STK) AUTHENTICATION mobile Short messaging service; security protocol; subscriber identity module (SIM) tool kit (STK); authentication; mobile
  • 相关文献

参考文献4

二级参考文献44

  • 1卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 2SMPP Developers Forum.Technical Realization of the Short Message Service (SMS),Point-to-Point (PP), GSM 03.40[S].1998.
  • 3WAP Forum.Wireless Application Protocol Wireless Application Specification, version 04[S].1999.
  • 4WAP Forum.Wireless Transport Layer Security Specification,version 1.2[S].1999.
  • 5WAP Forum.Wireless Application Protocol Identity Module Specification,Part:Security,version 05[S].1999.
  • 6KWON E K,CHO Y G.Integrated Transport Layer Security:END-to-End Security Model Between WTLS and TLS[Z].IEEE,2001.
  • 7System Management Bus Specification [EB/OL]. http://www. smbus. org/specs/smb10. pdf
  • 8.... http://www.infineon.com/,,..
  • 9NITGEN FIM10 Datasheet [EB/OL]. http..//classes, engr. oregonstate, edu/eecs/fall2004 / ece441/groups/g13/fire10 _ DataSheetvl. 0. pdf
  • 10Chen Ching-Han, Dai Jia-Hong. An embedded fingerprint authentication system with reduced hardware resources requirement. In: Proceedings of the International Symposium on Consumer Electronics. Hong Kong, China, 2005, 145-150

共引文献157

同被引文献9

  • 1Shengxiang Yang,Renato Tinós.A Hybrid Immigrants Scheme for Genetic Algorithms in Dynamic Environments[J].International Journal of Automation and computing,2007,4(3):243-254. 被引量:9
  • 2D. Naccache.Secure and Practical Identity-based Encryp- tion[].IET Information Security.2007
  • 3R. Curry,P. Lichodzijewski,M. I. Heywood.Scaling Ge- netic Programming to Large Datasets Using Hierarchical Dynamic Subset Selection[].IEEE Transactions on Systems Man and Cybernetics – Part B: Cybernetics.2007
  • 4F. Berzal,J. C. Cubero.An Effective Algorithm for Min- ing Subspace Clusters in Categorical Datasets[].Data Mining and Knowledge Discovery.2007
  • 5S. M. Bridges,R. B. Vaughn.Fuzzy Data Mining and Ge- netic Algorithms Applied to Intrusion Detection[].Pro- ceedings of the th Annual Canadian Information Tech- nology Security Symposium.2000
  • 6K. Triantafyllopoulos,J. Pikoulas.Multivariate Bayesian Regression Applied to the Problem of Network Security[].Journal of Forecasting.2002
  • 7.Java Neural Network Simulator[]..
  • 8.KDD Cup 1999 Data[]..1999
  • 9Ye,Nong,Emran,Syed Masum,Chen,Qiang,Vibert,Sean.Multivariate statistical analysis of audit trails for host-based intrusion detection[].IEEE Transactions on Computers.2002

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部