User dependent cryptography for security in future mobile telecommunication systems

Article English OPEN
Sabouri, A. ; Komninos, N. ; Douligeris, C. (2011)

In this paper we propose a user dependent scheme for enhancing security of the transmitted content in the future telecommunication systems. In order to achieve a higher level of security we introduce a scheme where the user identity gets involved in the encryption/decryption processes using an additional component for the block cipher which represents the user’s behavioural model. Applying such a scheme, in addition to introducing more difficulties to an attacker due to the user dependency of the cipher algorithm, gives the mobile operator the opportunity to ensure that a licensed service has not been shared by the customer. To show the feasibility of our approach we use the concept of invertible Boolean functions as an example.
  • References (4)

    [1] Technical Report: Security Architecture in UMTS Third Generation Cellular Networks, 2004, http://ccc.inaoep.mx/Reportes/CCC-04-002.pdf.

    [2] B. Sun, F. Yu, K. Wu, Y. Xiao, S. Member, and V. C. M. Leung, “Enhancing security using mobility-based anomaly detection in cellular mobile networks,” IEEE Transaction on Vehicular Technology, vol. 55, no. 4, pp. 1385-1396, 2006.

    [3] ETSI Technical Specification, “ETSI TS 100.929, V8.0.0, Digital Cellular Telecommunications System (phase 2+)(GSM); Security related network functions,”2000.

    [4] 3GPP Technical Specification, “3GPP TS 35.201 V9.0.0, Third Generation Partnership Project; Technical Specification Group; 3G Security; specification of the 3GPP confidentiality and integrity algorithms; document 1: f8 and f9 specification,” Dec 2009.

  • Metrics
    0
    views in OpenAIRE
    0
    views in local repository
    22
    downloads in local repository

    The information is available from the following content providers:

    From Number Of Views Number Of Downloads
    City Research Online - IRUS-UK 0 22
Share - Bookmark