{"title":"Improved trust based key management for end-to-end secure communication in cellular networks","authors":"Naila Mukhtar, M. S. Baig, L. A. Khan","doi":"10.1145/2799979.2800014","DOIUrl":null,"url":null,"abstract":"Use of mobile phones has tremendously increased over last two decades. Common man's life revolves around the usage of cell phones from payment of bills to secure conversation with family and friends. End-To-End Security is an important concern for such security critical applications with focus on key management. We have presented a model based on Web-of-trust style key management, with server involvement for mobile devices in cellular network environment. Our introduced server has some additive roles and responsibilities, which will help in efficient public key management by using the cellular network service. As public key cryptographic operations are computationally intensive, so proposed scheme is tested on mobile device for processing capability.","PeriodicalId":293190,"journal":{"name":"Proceedings of the 8th International Conference on Security of Information and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Conference on Security of Information and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2799979.2800014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Use of mobile phones has tremendously increased over last two decades. Common man's life revolves around the usage of cell phones from payment of bills to secure conversation with family and friends. End-To-End Security is an important concern for such security critical applications with focus on key management. We have presented a model based on Web-of-trust style key management, with server involvement for mobile devices in cellular network environment. Our introduced server has some additive roles and responsibilities, which will help in efficient public key management by using the cellular network service. As public key cryptographic operations are computationally intensive, so proposed scheme is tested on mobile device for processing capability.