• Title/Summary/Keyword: mobile PKI

Search Result 73, Processing Time 0.064 seconds

Design of Validation Procedure for Certification for PKI Based Next Generation Mobile Networks (PKI 방식의 차세대 이동통신 망에 적용 가능한 인증서 검증 절차 설계)

  • Jeong, Jang-Min;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.22 no.A
    • /
    • pp.95-100
    • /
    • 2002
  • When the wireless PKI is applied to 3G/4G mobile network which requires mutual authentication among all entities, the wired PKI procedure is not feasible for validating visited network's certifications because of the wireless environmental limitations. Also, if we depend on WAP based PKI, we cannot support confidence about certification validation since the information offered from visited network is not authenticated. Therefore, in this paper we consider various and unique characteristics of mobile environment for certification validation at 3G/4G mobile networks based on wireless PKI and then propose two certification validation procedures.

  • PDF

The Authentication Structure Based Mobile PKI (모바일 PKI 기반한 인증 구조)

  • 김미혜;서세영
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.67-75
    • /
    • 2004
  • In this paper, we design an authentication model based mobile PKI (Public Key Infrastructure). The authentication mood consists of Root-CA Home-network agent and Foreign-network agent. CA will going to gave the delegation ticket to Home-Agent or Foreign-Agent when they request. The authentication mode information security is various characteristic more then high speed, mobile network and low cost more then previous structure of assure information security.

  • PDF

A Proposal for Certificate Status Validation Using the Call Processing of PCS (PCS의 호처리를 이용한 인증서 상태검증 모델 제안)

  • Lee Young-Sook;Won Dong-Ho;Lee Young-Gyo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.45-53
    • /
    • 2005
  • With the rapid progress of research to offer a convenience of mobile communication, the mobile users can use not only the services of voice call but also the variety services of data communication using Internet. These include Internet Searching, Internet Shopping and Internet banking and Internet stock exchange and electronic payment and so on, based on PKI. Also, the need of data communication between the mobile users has been increased. As it is possible for mobile users to do user authentication, key distribution, encryption, decryption and so on, it is needed the certificate status validation between the mobile users. However due to the PCS(Personal Communication System) had been only designed and implemented for voice call between the mobile users, it is not easy to apply data communication between the mobile users on PKI. Therefore the study of for the data communication between the mobile users in PCS is a few. It is for the data transfer between the mobile users to communicate using call processing of PCS. So, we propose how to process the certificate status validation during call processing for data communication between the mobile users in the PCS.

  • PDF

Wireless Certificate Management Protocol for Mobile Phone Security (휴대폰에서의 무선 인증서 관리 프로토콜)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.90-98
    • /
    • 2008
  • PKI (Public Key Infrastructure) which is used for the security of E-commerce (Electronic-commerce) in wired internet is not suitable for the mobile phone because of the fundamental limitation of performance such as less memory and less powerful CPU. Therefore, we need to develop a wireless PKI (WPKI) that provides the similar security level as the wired PKI supporting mobile phone. In this paper, we propose a lightweight and secure Wireless Certificate Management Protocol (WCMP) that is executable to the mobile phone that has a constrained communication environment and limitation of performance, and show the implementation results of the scheme based on the mobile phone. We minimize data sizes processed in mobile phone, and optimize protocols for the certificate management. This results in the reduced module sizes to be able to install in mobile phone and shows as the same level as the wired CMP.

The Structure of Assure Information Security In Mobile Environment Based Mobile PKI (모바일 PKI 기반의 이동 보안 구조)

  • 서세영;신승수;최승권;조용환
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.132-139
    • /
    • 2003
  • In this paper, we design and implement the public key certification the structure of assure information security which play an important role in PKI (Public Key Infrastructure). The structure of assure information security consists of Root-CA, Home-network and Foreign-network. CA will going to gave the mandate to Home-Agent or Foreign-Agent when they request. The structure of assure information security is various characteristic : more then high speed, mobile network, and low cost more then previous structure of assure information security.

  • PDF

Research on the Issuing and Management Model of Certificates based on Clustering Using Threshold Cryptography in Mobile Ad Hoc Networking (이동 Ad Hoc 네트워킹에서 Threshold Cryptography를 적용한 클러스터 기반의 인증서 생성 및 관리 모델연구)

  • Park, Bae-Hyo;Lee, Jae-Il;Hahn, Gene-Beck;Nyang, Dae-Hun
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2004
  • A mobile ad hoc network(MANET) is a network where a set of mobile devices communicate among themselves using wireless transmission without the support of a fixed network infrastructure. The use of wireless links makes MANET susceptible to attack. Eavesdroppers can access secret information, violating network confidentiality, and compromised nodes can launch attack from within a network. Therefore, the security for MANET depends on using the cryptographic key, which can make the network reliable. In addition, because MANET has a lot of mobile devices, the authentication scheme utilizing only the symmetric key cryptography can not support a wide range of device authentication. Thereby, PKI based device authentication technique in the Ad Hoc network is essential and the paper will utilize the concept of PKI. Especially, this paper is focused on the key management technique of PKI technologies that can offer the advantage of the key distribution, authentication, and non-reputation, and the issuing and managing technique of certificates based on clustering using Threshold Cryptography for secure communication in MANET.

A Secure Security Architecture on the PKI-based Mobile Network (PKI 기반 이동 네트워크에서의 안전한 보안 구조)

  • 김수정;김미희;채기준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.205-207
    • /
    • 2004
  • MIPv6(Mobile IPv6)를 확장한 새로운 이동통신 기술인 이동 네트워크 (NEtwork Mobility, NEMO)는 여러 개의 노드와 하나 이상의 이동 라우터(Mobile Router, MR)로 구성되어 네트워크 단위로 이동성을 지원한다. NEMO의 경우 여러 네트워크들이 계층적으로 이루어진 형태를 가지고 있기 때문에, 상위 네트워크와 하위 네트워크의 긴밀한 관계가 유지되어야 한다. 따라서 이동 네트워크와 자신에게 서비스를 제공해 줄 방문 네트워크상에서 상위 네트워크와의 상호인중이 보안상 무엇보다 중요하다. 본 논문은 PKI와 challenge-response를 사용한 상호인중을 제안한다. 또한, 이러한 인중에 필요한 인증서를 받기 위해서는 기존의 중앙 집중화된 인중기관의 인중서 서비스는 이동 환경에 적합하지 않으므로, secret-share 기법을 이용하여 분산화 된 환경에서 인중서 서비스를 제공하는 안전한 보안 구조를 제안한다.

  • PDF

Mobile IP Registration Protocol Using PKI Certificates and CA (PKI 인증서와 CA를 이용한 Mobile IP 등록 프로토콜)

  • Park, Sang-Jun;Hong, Choong-Seon;Lee, Dae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.863-866
    • /
    • 2001
  • Mobile IP는 호스트의 이동성을 제공하여주는 대표적인 프로토콜이다. 이러한 이동 네트워킹 환경에서 전자상거래를 비롯한 여러 가지 다양한 데이터 서비스가 원활하게 제공되기 위해서는 정보보호 문제가 선결되어야 한다. 본 논문에서는 Mobile IP에서 공개키 기반 인증서와 CA(Certification Authority)를 이용한 Mobile IP 등록 프로토콜을 제안한다. 제안된 프로토콜은 이동 노드(mobile node)의 등록 메시지 인증과 재사용 공격(replay attack)을 방지한 수 있으며, 무선 환경을 고려한 공개키 암호방식을 최소로 사용하도록 제안하였다. 또한, 인증서를 이용한 인증방식으로 에이전트(agent)들과 이동노드간의 직접적인 인증이 이루어지도록 하였다. 제안된 Mobile IP 등록 프로토콜은 시뮬레이션을 통하여 기존에 제안된 공개키 기반의 Mobile IP 등록 프로토콜보다 성능이 우수하다는 것을 확인할 수 있었다.

  • PDF

An Efficient Signing and Certificate Status Management Scheme in Personal PKI (Personal PKI에서 효율적인 서명 및 인증서 상태 검증 기법)

  • Sur Chul;Shin Weon;Lee Kyung-Hyune
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.91-96
    • /
    • 2005
  • Recetly, the term Personal Public Key Infrastructure (PKI) was introduced to supprot reliable and authenticated service in a Personal Area Network (PAN). However, traditional public key signature schemes and certificate status management are not suitable for a PAN environment since mobile devices that constitute the PAN have limited computing capability. In this paper, we propose a new scheme that efficiently provides signature generation and certificate status management for mobile devices. Based on hash chain technique, we intend to reduce computational overhead on signature generation, and further, to minimize communication overhead for managing certificate status.

  • PDF

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.