Browse > Article

A Study on the authentication scheme for Security of Wireless Internet  

최용식 (인천대학교 컴퓨터공학과)
강찬희 (상지영서대학교 디지털정보과)
신승호 (인천대학교 컴퓨터공학과)
Publication Information
Abstract
The continuing development of the information technology industry and wireless networking has increased the use of mobile device, which provides both portability and mobility. As follows, demands for extended services within the wireless Internet are increasing rapidly. Because it still in its initial stages of development, the wireless Internet presents continuing problems in security and limitations in the content of services. Furthermore, most mobile equipment utilizes the touch pad input method. This input method is inconvenient when a user needs to input a long sentence. This has led to the more convenient development of image selection by using a pen mouse. In order to provide security under these conditions, a HASH code may be used to transmit an array of information and input values, created by the image input at the early stages. Thus, authentication and key exchange are completed securely. Messages are encoded and transmitted, preventing both information drain by insiders and interference from outside.
Keywords
Hash Code; security; mobile equipment; wireless;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 김선형, 김태윤, '제 3세대 이동 통신 시스템을 위한 인증 및 지불 기법', 정보처리학회 2002년 추계학술대회 VOL.09 NO.02 pp. 0000-0000, 2002.10.
2 Amir Herzberg, 'Payments and banking with mobile personal devices'   DOI   ScienceOn
3 B. Schneier and J. Kelsey, 'Unbalanced Feistel Networks and Block Cipher Design', Fast Software Encryption, Third International Workshop Proceedings (February 1996), Springer-Verlag, 1996, pp. 121-144
4 Geraldine Gray, 'Virtual Credit Card Processing System', Principle and Practice of Programming in Java 2002
5 SET Secure Electronic Transaction Setting the Stage for Safe Internet Shopping an enticing concept. http://www.mastercardintl.com/netechnology/set/
6 Overview of the SET Protocol, http://www.seas.upenn.edu/~tcom500/commerce/set.htm
7 Wireless Application Protocol Wireless Transport Layer Security, WAP Forum, 6th of April, 2001
8 Wireless Application Protocol Public Key Infrastructure Definition, WAP Forum, 26th of Oct. 2000
9 VISA & Mastercard, 'SET Electronic Transaction Specifiation', 1997
10 임수철, 강상승, 이병래, 김태윤, '무선인터넷에서의 종단 간 보안을 제공하는 신용카드 기반의 지불 프로토콜', 한국정보과학회 논문지 I VOL.29 NO.06 pp. 0645-0653, 2002.12   과학기술학회마을
11 양대현, 이석준, '무선 인터넷을 위한 패스워드 기반의 인증 및 키 교환 프로토콜', 한국정보과학회 논문지I VOL.29 NO.03 pp. 0324-0332, 2002.06.   과학기술학회마을
12 허재형, 신동규, 'PDA 상에서의 전자 상거래 보안 솔루션', 정보처리학회 2002년 춘계학술대회 VOL.09 NO.01 pp. 1349-1352, 2002.04.
13 Joshua D. Guttman, 'Security Protocol Design via Authentication Tests', Computer Security Foundations Workshop, April 11. 2002   DOI