Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Secure Mobile Social Networks using USIM in a Closed Environment
Blekinge Institute of Technology, Sweden.
RISE., Swedish ICT, SICS, Security Lab.ORCID-id: 0000-0001-8003-200x
Blekinge Institute of Technology, Sweden.
2012 (Engelska)Ingår i: 7th International Conference for Internet Technology and Secured Transactions, IEEE , 2012, 13, s. 439-446, artikel-id 6470846Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices. Basic security mechanisms normally based on passwords for the authentication of social-network users are widely deployed and poses a threat for the user security. In particular, for dedicated social groups with high confidentiality and privacy demands, stronger and user friendly principles for the authentication and identification of group members are needed. On the other hand, most of the mobile units already provide strong authentication procedures through the USIM/ISIM module. This paper explores how to build an architectural framework for secure enrollment and identification of group members in dedicated closed social groups using the USIM/SIM authentication and in particular, the 3GPP Generic Authentication Architecture (GAA), which is built upon the USIM/SIM capabilities. One part of the research is to identify the marketable use-cases with corresponding security challenges to fulfill the requirements that extend beyond the online connectivity. This paper proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have also implemented an initial proof of the concept prototype to simulate the secure identification procedure based on the proposed design. Our implementation has demonstrated the flexibility of the solution to be applied independently for applications requiring secure identification.

Ort, förlag, år, upplaga, sidor
IEEE , 2012, 13. s. 439-446, artikel-id 6470846
Nyckelord [en]
Information Security, Mobile Social Networks, Secure Identification
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
URN: urn:nbn:se:ri:diva-24093ISBN: 9781908320087 (tryckt)OAI: oai:DiVA.org:ri-24093DiVA, id: diva2:1043172
Konferens
7th International Conference for Internet Technology and Secured Transactions
Projekt
SWINTillgänglig från: 2016-10-31 Skapad: 2016-10-31 Senast uppdaterad: 2021-01-07Bibliografiskt granskad

Open Access i DiVA

fulltext(496 kB)114 nedladdningar
Filinformation
Filnamn FULLTEXT01.pdfFilstorlek 496 kBChecksumma SHA-512
1b3222436338c2f5b0d228d9320210a8087af7f4ea42ee294f2feb5ae0cddea2f98d5844272d5752a226374e633222798418f0416cbcf2444ac548c612a8a5e5
Typ fulltextMimetyp application/pdf

Övriga länkar

http

Person

Gehrmann, Christian

Sök vidare i DiVA

Av författaren/redaktören
Gehrmann, Christian
Av organisationen
Security Lab
Data- och informationsvetenskap

Sök vidare utanför DiVA

GoogleGoogle Scholar
Totalt: 114 nedladdningar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

isbn
urn-nbn

Altmetricpoäng

isbn
urn-nbn
Totalt: 92 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf