{"title":"Subscriber Authentication in Cellular Networks with Trusted Virtual SIMs","authors":"M. Kasper, N. Kuntze, A. Schmidt","doi":"10.1109/ICACT.2008.4493913","DOIUrl":null,"url":null,"abstract":"The primary goal of this paper is to design a software replacement for a Subscriber Identity Module (SIM) based on the TCG MPWG Reference Architecture in order to access a mobile cellular network and its offered services. Therefor, we introduce a virtual software SIM (vSIM) with comparable usage and security characteristics like the traditional smartcard-based solution. Additionally, running a virtual SIM as a trusted and protected software on a mobile device allow significant expansion of services by introducing new usage scenarios and business models, cost reduction and more flexibility. Our approach demonstrates the substitutability of a SIM card with an adequate trusted software module supported and protected by a trustworthy operating system. In particular we propose several methods for authentication and enrollment of a subscriber.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 10th International Conference on Advanced Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2008.4493913","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
The primary goal of this paper is to design a software replacement for a Subscriber Identity Module (SIM) based on the TCG MPWG Reference Architecture in order to access a mobile cellular network and its offered services. Therefor, we introduce a virtual software SIM (vSIM) with comparable usage and security characteristics like the traditional smartcard-based solution. Additionally, running a virtual SIM as a trusted and protected software on a mobile device allow significant expansion of services by introducing new usage scenarios and business models, cost reduction and more flexibility. Our approach demonstrates the substitutability of a SIM card with an adequate trusted software module supported and protected by a trustworthy operating system. In particular we propose several methods for authentication and enrollment of a subscriber.