期刊文献+

A Secure Short Message Communication Protocol 被引量:1

A Secure Short Message Communication Protocol
下载PDF
导出
摘要 According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway axe realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application. According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway axe realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.
出处 《International Journal of Automation and computing》 EI 2008年第2期202-207,共6页 国际自动化与计算杂志(英文版)
基金 This work was supported by the Mobile Police Project of China(No.J1GAB23W013) National High Technology Research and Development Program of China(863 Program,No.2007AA01Z479).
关键词 Short messaging service security protocol subscriber identity module (SIM) tool kit (STK) AUTHENTICATION mobile Short messaging service; security protocol; subscriber identity module (SIM) tool kit (STK); authentication; mobile
  • 相关文献

参考文献4

二级参考文献44

  • 1卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 2SMPP Developers Forum.Technical Realization of the Short Message Service (SMS),Point-to-Point (PP), GSM 03.40[S].1998. 被引量:1
  • 3WAP Forum.Wireless Application Protocol Wireless Application Specification, version 04[S].1999. 被引量:1
  • 4WAP Forum.Wireless Transport Layer Security Specification,version 1.2[S].1999. 被引量:1
  • 5WAP Forum.Wireless Application Protocol Identity Module Specification,Part:Security,version 05[S].1999. 被引量:1
  • 6KWON E K,CHO Y G.Integrated Transport Layer Security:END-to-End Security Model Between WTLS and TLS[Z].IEEE,2001. 被引量:1
  • 7System Management Bus Specification [EB/OL]. http://www. smbus. org/specs/smb10. pdf 被引量:1
  • 8.... http://www.infineon.com/,,.. 被引量:1
  • 9NITGEN FIM10 Datasheet [EB/OL]. http..//classes, engr. oregonstate, edu/eecs/fall2004 / ece441/groups/g13/fire10 _ DataSheetvl. 0. pdf 被引量:1
  • 10Chen Ching-Han, Dai Jia-Hong. An embedded fingerprint authentication system with reduced hardware resources requirement. In: Proceedings of the International Symposium on Consumer Electronics. Hong Kong, China, 2005, 145-150 被引量:1

共引文献158

同被引文献9

  • 1Shengxiang Yang,Renato Tinós.A Hybrid Immigrants Scheme for Genetic Algorithms in Dynamic Environments[J].International Journal of Automation and computing,2007,4(3):243-254. 被引量:9
  • 2D. Naccache.Secure and Practical Identity-based Encryp- tion[].IET Information Security.2007 被引量:1
  • 3R. Curry,P. Lichodzijewski,M. I. Heywood.Scaling Ge- netic Programming to Large Datasets Using Hierarchical Dynamic Subset Selection[].IEEE Transactions on Systems Man and Cybernetics – Part B: Cybernetics.2007 被引量:1
  • 4F. Berzal,J. C. Cubero.An Effective Algorithm for Min- ing Subspace Clusters in Categorical Datasets[].Data Mining and Knowledge Discovery.2007 被引量:1
  • 5S. M. Bridges,R. B. Vaughn.Fuzzy Data Mining and Ge- netic Algorithms Applied to Intrusion Detection[].Pro- ceedings of the th Annual Canadian Information Tech- nology Security Symposium.2000 被引量:1
  • 6K. Triantafyllopoulos,J. Pikoulas.Multivariate Bayesian Regression Applied to the Problem of Network Security[].Journal of Forecasting.2002 被引量:1
  • 7.Java Neural Network Simulator[].. 被引量:1
  • 8.KDD Cup 1999 Data[]..1999 被引量:1
  • 9Ye,Nong,Emran,Syed Masum,Chen,Qiang,Vibert,Sean.Multivariate statistical analysis of audit trails for host-based intrusion detection[].IEEE Transactions on Computers.2002 被引量:1

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部