Skip to main content
Log in

Secure and efficient public key management in next generation mobile networks

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Employing public key-based security architecture is inevitable for the advanced security applications in the mobile networks. However, key storage management problems have arisen, because the public key computation is still the large overhead to USIM, and the mobile equipment has potential threats of the key leakage or loss. In order to solve such shortcomings, we improve the key-insulated models and propose “Trust Delegation” model that the overall security computations are operated in ME, while the initial private key still remains in the secure storage in USIM. Our model is resilient against not only key exposure but also key loss. Finally, we show that the overall transactions can be reduced to one-third than current 3GPP Generic Authentication Architecture.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Abe T, Okamoto M (2002) Delegation chains secure up to constant length. IEICE Trans. Fundamentals E85-A(1):110–116

  2. Abid M, Song S, Moustafa H, Afifi H (2009) Integrating identity-based cryptography in IMS service authentication. Int J Netw Secur Appl (IJNSA) 1(3)

  3. Boneh D, Franklin MK (2001) Identity-based encryption from the Weil Pairing advances in cryptology. Proceedings of CRYPTO 2001

  4. Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. In: EUROCRYPT ‘02 proceedings of the international conference on the theory and applications of cryptographic techniques: advances in cryptology

  5. Dodis Y, Katz J, Xu S, Yung M (2003) Strong key-insulated signature schemes. Proceedings of PKC’03

  6. Handschuh H, Paillier P (2000) Smart card crypto-coprocessors for public-key cryptography, CARDIS ‘98. In: Proceedings of the international conference on smart card research and applications, Springer, London, UK, pp 372–379

  7. Koblitz N (1987) Elliptic curve cryptosystems. In: Mathematics of Computation 48, p 203–209

  8. Martin L (2008) Introduction to identity-based encryption. Number ISBN-13: 978-1-59693-238-8. Artech House, Inc., 685 Canton Street, Norwood, MA 02062

  9. Na JC (2008) Next generation USIM technologies. TTA Journal (written in Korean) 116:80–85

    Google Scholar 

  10. Ohtake G, Hanaoka G, Ogawa K (2008) An efficient strong key-insulated signature scheme and its application. 5th European PKI Workshop, NTNU, Trondheim, Norway, June 16–17

  11. RSA Laboratories (2000) RSAES-OAEP Encryption Scheme—Algorithm specification and supporting documentation

  12. Sun Microsystems, Inc. (2009) Runtime Environment Specification, java card platform, version 3.0.1 connected edition

  13. Third Generation Partnership (3GPP) (2011) TS 33.401 v 11.0.1 3GPP System Architecture Evolution (SAE); Security Architecture (Release 11)

  14. Third Generation Partnership (3GPP) (2010) TS 33.220 v10.0.0 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (Release 10)

  15. Third Generation Partnership (3GPP) (2010) TS 33.102 v10.0.0 3G Security: security architecture (Release 10)

  16. Third Generation Partnership (3GPP) (2010) TS 33.221 v10.0.0 Generic Authentication Architecture (GAA); Support for Subscriber Certificates (Release 10)

  17. Traynor P, Lin M, Ongtang M, Rao V, Jaeger T, McDaniel P, La Porta V (2009) On cellular botnets: measuring the impact of malicious devices on a cellular network core. In CCS’09: Proceedings of the 16th ACM conference on Computer and communications security, p 223–234, New York, NY, USA, ACM

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (KRF-2008-331-D00580).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to James J. (Jong Hyuk) Park.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Han, K., Mun, H., Shon, T. et al. Secure and efficient public key management in next generation mobile networks. Pers Ubiquit Comput 16, 677–685 (2012). https://doi.org/10.1007/s00779-011-0434-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-011-0434-9

Keywords

Navigation