Mobile identity management system in heterogeneous wireless networks

Łukasz Kucharzewski , Zbigniew Kotulski

Abstract

Heterogeneous wireless networks increasingly encroach on our lives. Various technologies and mobile applications more often than usual are now used by mobile users. Intensive development of mobile networks not only sets new standards for radio, but increasingly focuses on providing security for traffic transmitted in wireless networks. Security in wireless networks has never been the primary objective of the designers of new network standards. The reason for this fact were both low hardware resources of equipment, but also lack of awareness of users about the potential vulnerabilities. Creating a secure, independent of network architecture solutions effectively raising the level of security of transmitted data between end users is the main priority of our research. Current wireless security solutions do not provide sufficient protection of the integrity, confidentiality of data, are not designed to operate in heterogeneous networks, or are too complex to implement. Both networks WiMAX, LTE and WiFi, there are methods that protect the resources in these networks, but they are not consistent with each other. The proposed security system requires the use of mobile version of the PKI to verify the identity of mobile users. Mobile PKI center is an innovative solution, not yet introduced for casual use. Such a solution in heterogeneous wireless networks is a fast, secure and transparent to transmission medium. Designing secure and efficient authentication protocols to enable fast connections to the heterogeneous network is challenging. In the proposed system in this paper, the users authenticate their identity digital certificates that are issued by a trusted third party (CA). PKI uses the algorithms based on elliptic curves. Advantages of elliptic curves in mobile environment will be particularly evident. This ensures adequate protection of data in a heterogeneous networks. In this system, it is possible to implement many new secure services for end users secure email, secure chat, secure remote access.
Author Łukasz Kucharzewski (FEIT / IT)
Łukasz Kucharzewski,,
- The Institute of Telecommunications
, Zbigniew Kotulski (FEIT / IT)
Zbigniew Kotulski,,
- The Institute of Telecommunications
Journal seriesAnnales UMCS Informatica, Sectio AI, ISSN 1732-1360, (B 5 pkt)
Issue year2011
VolXI
No3
Pages141-153
DOIDOI:10.2478/v10065-011-0016-5
Languageen angielski
File
Group Signature Revocable Anonymity Scheme.pdf 644.42 KB
Score (nominal)5
Citation count*1 (2020-01-21)
Cite
Share Share

Get link to the record


* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Back
Confirmation
Are you sure?