Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2012.19C.1.029

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks  

Park, In-Shin (성균관대학교 정보보호학과)
Jeong, Jong-Pil (성균관대학교 정보통신공학부)
Abstract
Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.
Keywords
Information Communication; Mobile Network; Information Security; Information Protection Applied System;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Rao J, Rohatgi P, Scherzer H, and Tinguely S., "Partitioning attacks: or how to rapidly clone some GSM cards," IEEE symposium on security and privacy, 2002.
2 Khan M, Ahmed A and Cheema A.R, "Vulnerabilitis of UMTS Access Domain Security Architecture", Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08, Ninth ACIS International Conference on
3 Eastlake D, Crocker S, Schiller J., "Randomness recommendations for security," IETF RFC 1750, 1994.
4 Fry M, Fischer M, Karaliopoulos M, smith P and Hutchison D, "Challenge identification for network resilience", Next Generation Internet(NGI), 2010 6th EURO-NF Conference on, pp.1-8, 2010
5 Liberty Alliance. Liberty ID-FF bindings and profiles specification v1.2, 2003.
6 Microsoft Corp. Microsoft.NET passport review guide, .
7 Pfitzmann B and Waidner M, "Analysis of liberty single-sign-on with enabled clients," Internet Computing, IEEE, Vol.7, Issue:6, pp.38-44, 2003.   DOI   ScienceOn
8 Liberty Alliance. Liberty trust models guidelines v1.0, 2003.
9 IDC, Worldwide Identity Theft Black Market 2006-2010 Forecast, 2006.
10 Liberty Alliance Project, http://www.projectliberty.org/
11 Microsoft, Introducing Windows CardSpace, http://msdn.microsoft.com/
12 OpenID, http://openid.net/
13 Security Assertion Markup Language(SAML) OASIS Standard Specification, Version 2.0, http://www.oasis-open. org/committees/tc_home.php?wg_abbrev=security
14 Higgins Project, http://www.eclipse.org/higgins/
15 Siemens, "Identity management for micropayments in a mobile environment," Paycircle, 2003.
16 Christos K. Dimitriadis and Despina Polemi, "An identity management protocol for Internet applications over 3G mobile networks," Computers & Security, Vol.25, pp.45-51, February, 2006.   DOI   ScienceOn
17 3rd Generation Partnership Project. TS 33.102 - 3G security; security architecture v6.0.0, 2003.
18 Ed Gerck, Secure Email Technologies X.509 / PKI, PGP, IBE, and ZMAIL, in Chapter 12, Corporate Email Management, ICFAI University Press, pp.171-196, 2007.
19 http://www.gnupg.org
20 http://www.3gpp.org
21 3rd Generation Partnership Project. TS 33.234 - 3G security; wireless local area network (WLAN) interworking security v6.0.0, 2004.
22 OASIS. Glossary for the OASIS security assertion markup language(SAML) v1.1, 2003.
23 Liberty Alliance. Liberty ID-FF protocols and schema specification v1.2, 2003.
24 Liberty Alliance. Liberty ID-FF architecture overview v1.2, 2003.
25 http://www.sdl-forum.org/MSC/index.htm
26 Dimitriadis C and Polemi D., "A protocol for incorporating biometricsin 3G with respect to privacy," 7th international conference on enterprise information systems (ICEIS2005), pp.123-135, 2005.
27 3rd Generation Partnership Project. TS 31.101 - UICC terminal interface; physical and logical characteristics v6.2.0, 2003.
28 3rd Generation Partnership Project 2. S.R0082 enhanced packet data air interface security v1.0, 2003.
29 Urien P, Pujolle G, EAP-support in smartcard draft-urien-eap-smartcard-21.txt, IETF draft, 2011.
30 Wisely D, Eardley P, and Burness L. IP for 3G - networking technologies for mobile communications, John Wiley & Sons, 2002.
31 3rd Generation Partnership Project. TS 23.234 - 3GPP system to wireless local area network (WLAN) interworking; system description v2.4.0, 2004.
32 Mont M, Pearson S, and Bramhall P., "Towards accountable management of identity and privacy," Proceedings of 14th international workshop on database and expert systems applications, 2003.
33 Bonatii P and Samarati P., "A unified framework for regulating service access and information release on the web," Computer Security Journal, Vol.10(3), pp.241-72, 2003.
34 Damiani E, De Capitani di Vimercati S, and Samarati P., "Managing multiple and dependable identities," IEEE Internet Computing, Vol.7(6), pp.29-37, 2003.   DOI   ScienceOn