Dergi makalesi Açık Erişim

SIMSec: A Key Exchange Protocol Between SIM Card and Service Provider

Ok, Kerem; Coskun, Vedat; Yarman, Siddik Binboga; Cevikbas, Cem; Ozdenizci, Busra


MARC21 XML

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Coskun, Vedat</subfield>
    <subfield code="u">Isik Univ, Dept Informat Technol, Istanbul, Turkey</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Yarman, Siddik Binboga</subfield>
    <subfield code="u">Istanbul Univ, Elect &amp; Elect Engn Dept, Istanbul, Turkey</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Cevikbas, Cem</subfield>
    <subfield code="u">Turkcell Technol, Istanbul, Turkey</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Ozdenizci, Busra</subfield>
    <subfield code="u">Isik Univ, Dept Informat Technol, Istanbul, Turkey</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="p">WIRELESS PERSONAL COMMUNICATIONS</subfield>
    <subfield code="v">89</subfield>
    <subfield code="n">4</subfield>
    <subfield code="c">1371-1390</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-tubitak-destekli-proje-yayinlari</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="a">Creative Commons Attribution</subfield>
    <subfield code="u">http://www.opendefinition.org/licenses/cc-by</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.1007/s11277-016-3326-5</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">SIMSec: A Key Exchange Protocol Between SIM Card and Service Provider</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">Ok, Kerem</subfield>
    <subfield code="u">Isik Univ, Dept Informat Technol, Istanbul, Turkey</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="o">oai:zenodo.org:60259</subfield>
    <subfield code="p">user-tubitak-destekli-proje-yayinlari</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="2">opendefinition.org</subfield>
    <subfield code="a">cc-by</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2016-01-01</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="u">https://aperta.ulakbim.gov.trrecord/60259/files/bib-996ab1a6-ae05-4c76-8c48-f8c1b7cc1abb.txt</subfield>
    <subfield code="z">md5:f71701b4b3b499856e9fe3226ddabead</subfield>
    <subfield code="s">191</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <controlfield tag="005">20210316005724.0</controlfield>
  <controlfield tag="001">60259</controlfield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">Mobile technology is so popular and overdosed adoption is inevitable in today's world. As the mobile technologies have advanced, Service Providers (SP) have offered services via Smartphones and some of them required secure data communication between the Subscriber Identity Module (SIM) cards on Smartphones and the servers of SP. The latest SIM cards comply with recent specifications including secure domain generation, mobile signatures, pre-installed encryption keys, and other useful security services. Nevertheless, un-keyed SIM cards do not satisfy such requirements, thus end-to-end encryption between the SIM card and SP cannot be provided. In this paper, we provide a key exchange protocol, which creates a symmetric key through the collaborative work of the SIM card and the SP server. After a successful protocol performance, the SIM card and SP can perform end-to-end data encryption. After defining the protocol, we also discuss the security issues and provide a formal security analysis of the protocol using the Casper/FDR tool.</subfield>
  </datafield>
</record>
26
5
görüntülenme
indirilme
Görüntülenme 26
İndirme 5
Veri hacmi 955 Bytes
Tekil görüntülenme 24
Tekil indirme 5

Alıntı yap