Skip to main content
Log in

Fair and Secure Mobile Billing Systems

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In the current mobile communication networks, there is no undeniable evidence for calling information in the billing systems. Chen, Jan and Chen proposed a billing system by introducing a trusted third party—Observer and exploiting a hash chain mechanism. In this paper, we first identify some vulnerabilities in their mobile billing system. Then, we propose a fair and secure billing system based on a proper combination of digital signature and hash chain mechanism. The proposed system can achieve authentication, non-repudiation, and fairness, which are desirable security requirements for an undeniable mobile billing system. It is very efficient and applicable not only to the current GSM, but also to the 3GSM.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Anderson, R. J., Manifavas, C., & Sutherland, C. (1997). Netcard—a practical electronic-cash system. In Proceedings of the International Workshop on Security Protocols (pp. 49–57), London, UK. Springer-Verlag.

  2. Bellare, M., & Rogaway, P. (1997). Minimizing the use of random oracles in authenticated encryption schemes. In ICICS ’97: Proceedings of the First International Conference on Information and Communication Security (pp. 1–16), Beijing, China. Springer-Verlag.

  3. Chen, L., Hitz, H. J., Horn, G., Howker, K., Kessler, V., Knudsen, L., & Mitchell, C. J. (1996). The use of trusted third parties and secure billing in umts. In Proceedings of ACTS Mobile Telecommunications Summit (pp. 493–499), Granada.

  4. Chen Y.-Y., Jan J.-K., Chen C.-L. (2005) A fair and secure mobile billing system. Computer Networks 48(4): 517–524

    Article  Google Scholar 

  5. Hauser, R., Steiner, M., & Waidner, M. (1996). Micro-payments based on iKP. Technical Report 2791, 12 February 1996.

  6. Jutla, C., & Yung, M. (1996). Paytree: Amortized signature for flexible micropayments. In Proceedings of 2nd USENIX Workshop on Electronic Commerce (pp. 213–221).

  7. Lamport L. (1981) Password authentication with insecure communication. Communications of the ACM 24(11): 770–772

    Article  MathSciNet  Google Scholar 

  8. Martin, K. M., Preneel, B., Mitchell, C. J., Hitz, H.-J., Horn, G., Poliakova, A., & Howard, P. (1998). Secure billing for mobile information services in umts. In IS&N ’98: Proceedings of the 5th International Conference on Intelligence and Services in Networks(pp. 535–548), London, UK. Springer-Verlag.

  9. Merkle, R. C. (1989). A certified digital signature. In CRYPTO ’89: Proceedings on Advances in Cryptology (pp. 218–238), New York, USA. Springer-Verlag.

  10. Rahnema M. (1993) Overview of the gsm system and protocol architecture. IEEE Communication Magazine 3: 92–100

    Article  Google Scholar 

  11. Rivest, R. L., & Shamir, A. (1997). Payword and micromint: Two simple micropayment schemes. In Proceedings of the International Workshop on Security Protocols (pp. 69–87), London, UK. Springer-Verlag.

  12. Shenker S., Clark D., Estrin D., Herzog S. (1996) Pricing in computer networks: Reshaping the research agenda. SIGCOMM Computer Communication Review 26(2): 19–43

    Article  Google Scholar 

  13. Zhou, J., & Gollman, D. (1996). A fair non-repudiation protocol. In S&P ’96: Proceedings of the 1996 IEEE Symposium on Security and Privacy (p. 55), Washington, DC, USA. IEEE Computer Society.

  14. Zhou, J., & Lam, K.-Y. (1998). Undeniable billing in mobile communication. In MobiCom ’98: Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (pp. 284–290), New York, USA. ACM Press.

  15. 3GPP TS 33.120 V4.0.0. 3g security—security principles and objectives (release 4). Technical report, March 2001.

  16. 3GPP TS 21.133 V4.1.0. 3g security—security threats and requirements (release 4). Technical report, December 2001.

  17. 3GPP TS 32.240 V8.2.00. Charging management; charging architecture and principles (release 8). Technical report, March 2008.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiqun Li.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, S., Wang, G., Zhou, J. et al. Fair and Secure Mobile Billing Systems. Wireless Pers Commun 51, 81–93 (2009). https://doi.org/10.1007/s11277-008-9602-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-008-9602-2

Keywords

Navigation