Skip to main content
Log in

Robust mutual trust architecture for safety critical service in heterogeneous mobile network environment

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Wireless network services are more vigorous than ever due to the rapid development of mobile devices such as smartphones. Most mobile devices are evolving into multi-purpose handsets having multiple interfaces and always on, operating in a state that can receive the data any time through these different interfaces. In line with this trend, safety critical services such as e-commerce and on-line financial service have now mostly been used through the mobile environment. Since the Internet service is made up of interaction between the user and the service provider, service safety is based on mutual trust between them. In other words, the user terminal and the service provider system should have confidence in the identities of each other. In heterogeneous mobile network, the user terminal can get access to the service system through diverse access networks simultaneously. So, service provider cannot distinguish which is a valid access for service. In this paper, we propose a mutual trust architecture that can maintain a sustainable secure relation between the user terminal and the safety critical service system by using both personal and network information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. The GSM Association. (2007). Pay-Buy-Mobile business opportunity analysis—Public White Paper. November 2007.

  2. Little, A. D. (2006). Global M-Payment Report Update 2009—M–payments surging ahead: distinct opportunities in developed and emerging markets.

  3. Mobey Forum. (2008). Best practice for mobile financial services. Vienna: Mobey Forum

  4. Choi, Yo-Han, Seo, Hee-Suk, & Baek, Eui-Chil. (2012). Mobile malicious codemasquerading as a game at risk of infection. Journal of Future Game Technology, 2(1), 111–122.

  5. Stanley, M. (2009). The Mobile Internet Report, December 2009.

  6. ITU-T International Telecommunication Union. (2009). Measuring the information society—The ICT Development Index. Geneva: ITU

  7. Sundarraj, R. P. & Wu, J. (2005). Using information-systems constructs to study online and telephone-banking technologies. Electronic Commerce Research and Applications, 4, 427–443.

  8. Barne, S. J., & Corbitt, B. (2003). Mobile banking: Concept and potential. International Journal of Mobile Communications, 1, 273–288.

  9. Kent, S., & Seo, K. (2005). Security architecture for the Internet Protocol. IETF RFC4301, December 2005.

  10. Briscoe, B. (2010). Tunnelling of explicit congestion notification. IETF RFC 6040, November 2010.

  11. Dierks, T., & Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246, August 2008.

  12. WAP Forum. (2001). Wireless transport layer security specification, Wireless Application Protocol. WAP-261-WTLS-20010406-a. http://www.wapforum.org.

  13. Eronen, P. (2006). IKEv2 mobility and multihoming Protocol (MOBIKE). IETF RFC4555, June 2006.

  14. ITU-T International Telecommunication Union. (2007). Password-authenticated key exchange (PAK) protocol. ITU-T Rec. X.1035. Geneva: ITU

  15. Kaufman, C., Hoffman, P., Nir, Y., & Eronen, P. (2010). Internet key exchange protocol version 2 (IKEv2). IETF RFC 5996, September 2010.

  16. Black, D. L., & McGrew D. A. (2008). Using authenticated encryption algorithms with the encrypted payload of the Internet key exchange version 2 (IKEv2) protocol. IETF RFC 5282, August 2008.

  17. Li, J., Liu, X., Liu, L., Sun, D. & Li, B. (2011). HiTrust: Building cross-organizational trust relationship based on a hybrid negotiation tree. Telecommunication Systems, 52(2), 1353–1365. doi:10.1007/s11235-011-9648-4.

  18. Kang, J., Lee, J., Hwang, C., & Chang, H. (2011). The study on a convergence security service for manufacturing industries. Telecommunication Systems, 52(2), 1389–1397. doi:10.1007/s11235-011-9651-9.

  19. Chung, M., Lee, Y., Shon, T., & Moon, J. (2011). A security model for IPTV with one-time password and Conditional Access System for smart mobile platform. Telecommunication Systems, 52(2), 1399–1407. doi:10.1007/s11235-011-9652-8.

  20. Kent, S. (2005). IP authentication header. IETF RFC 4302, December 2005.

  21. Kent, S. (2005). IP encapsulating security payload (ESP). IETF RFC 4303, December 2005.

  22. Eastlake, D. E., & Jones, P. (2001). US secure hash algorithm 1 (SHA1). IETF RFC3174, September 2001.

  23. Eastlake, D. E., & Hansen, T. (2011). US secure hash algorithms (SHA and SHA-based HMAC and HKDF). IETF RFC 6234, May 2011.

  24. Eastlake, D. E., Schiller, J., & Crocker, S. (2005). Randomness requirements for security. IETF RFC 4086, June 2005.

  25. Lampropoulo, G., Salkintzis, A. K., & Passas, N. (2008). Media independent handover for seamless service provision in heterogeneous networks. IEEE Communications Magazine, 46(1), 64–71.

    Article  Google Scholar 

  26. Harris, E. P., Depp, S. W., Pence, W. E., Kirkpatrick, S., Sri-Jayantha, M., & Troutman, R. R. (1995). Technology directions for portable computers. Proceedings of the IEEE, 83(4), 636–658.

    Article  Google Scholar 

  27. Wireshark, network protocol analyzer. http://www.wireshark.org.

Download references

Acknowledgments

This research was supported by the IT R&D program of MSIP (Ministry of Science, ICT and Future Planning)/NIPA (National IT Industry Promotion Agency). 12221-14-1001, Next Generation Network Computing Platform Testbed.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunghyun Yoon.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yoon, S., Lee, S.S. & Kim, SH. Robust mutual trust architecture for safety critical service in heterogeneous mobile network environment. Telecommun Syst 60, 275–284 (2015). https://doi.org/10.1007/s11235-015-0029-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-015-0029-2

Keywords

Navigation