Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.2.243

The Mobile Meeting Authentication Scheme Providing Mobility and Privacy  

Yun, Sunghyun (Div. of Information & Communication Engineering, Baekseok University)
Publication Information
Journal of Digital Convergence / v.12, no.2, 2014 , pp. 243-248 More about this Journal
Abstract
The demand for messenger service goes on growing rapidly with widespread use of smartphones. Generally, the smartphone messenger provides group communication functions in which users can make the group and communicate with each other. In the mobile meeting, the attendees can participate in the meeting with use of smartphone messengers wherever they are. To make the mobile meeting put to practical use, the mobility and privacy should be ensured to attendees. To satisfy the mobility requirement, the user which is not belong to the group members should not be able to participate in the meeting. To ensure the privacy requirement, the attendees should have not to repudiate the meeting results. In this study, the mobile meeting authentication scheme is proposed which provides mobility and privacy. The proposed scheme consists of meeting group creation, group key generation, group signature and verification protocols. All attendees should have to participate in the signature verification because it is based on the challenge-response type protocol. Thus, it's not possible to collude with malicious attendees to change the meeting results.
Keywords
Mobile Meeting; Mobility; Privacy; Group Signature; Biometric Key;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Vivaracho-Pascual, J. Pascual-Gaspar, On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, pp. 1-10, 2011.
2 E. J. Choi, KaKaoTalk Mobile App Case Study, http://www.korea-marketing.com/kakaotalkmobile- app-case-study/
3 S. H. Yun, The USIM based Biometric Multi- Signature for Mobile Content Authentication, ICONI 2011, pp. 137-141, 2011.
4 N. K. Ratha, J. H. Connell, R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001.   DOI   ScienceOn
5 Apple Support, iPhone 5s: Using Touch ID, http://support.apple.com/kb/HT5883
6 B. S. Yu, S. H. Yun, The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing, Journal of the Korea Convergence Society, Vol. 1, No. 1, pp. 9-14, 2010.
7 The 3GPP Project, Characteristics of the USIM Application, 3GPP TS 31.02, http://www.3gpp.org/ftp/Specs/html-info/31102.htm.
8 S. H. Yun, H. S. Lim, Y. S. Jeong, S. Y. Jung, J. K. Chang, The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits, Wireless Personal Communications, Springer, Vol. 60, No. 3, pp. 405-418, 2011.   DOI
9 ITU-T X.1088, A Framework for Biometric Digital Key Generation, ITU-T, 2008.
10 D. M. Burton, Elementary Number Theory, McGraw-Hill Science/Engineering/Math, 2010.