Secure and efficient public key management in next generation mobile networks

  • Authors:
  • Kyusuk Han;Hyeran Mun;Taeshik Shon;Chan Yeob Yeun;James J. (Jong Hyuk) Park

  • Affiliations:
  • KAIST, Daejeon, South Korea;ETRI, Daejeon, South Korea;Ajou University, Suwon, South Korea;KUSTAR University, Sharjah, UAE;SeoulTech, Seoul, South Korea

  • Venue:
  • Personal and Ubiquitous Computing
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Employing public key-based security architecture is inevitable for the advanced security applications in the mobile networks. However, key storage management problems have arisen, because the public key computation is still the large overhead to USIM, and the mobile equipment has potential threats of the key leakage or loss. In order to solve such shortcomings, we improve the key-insulated models and propose "Trust Delegation" model that the overall security computations are operated in ME, while the initial private key still remains in the secure storage in USIM. Our model is resilient against not only key exposure but also key loss. Finally, we show that the overall transactions can be reduced to one-third than current 3GPP Generic Authentication Architecture.