{"title":"基于可信虚拟sim卡的蜂窝网络用户身份验证","authors":"M. Kasper, N. Kuntze, A. Schmidt","doi":"10.1109/ICACT.2008.4493913","DOIUrl":null,"url":null,"abstract":"The primary goal of this paper is to design a software replacement for a Subscriber Identity Module (SIM) based on the TCG MPWG Reference Architecture in order to access a mobile cellular network and its offered services. Therefor, we introduce a virtual software SIM (vSIM) with comparable usage and security characteristics like the traditional smartcard-based solution. Additionally, running a virtual SIM as a trusted and protected software on a mobile device allow significant expansion of services by introducing new usage scenarios and business models, cost reduction and more flexibility. Our approach demonstrates the substitutability of a SIM card with an adequate trusted software module supported and protected by a trustworthy operating system. In particular we propose several methods for authentication and enrollment of a subscriber.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Subscriber Authentication in Cellular Networks with Trusted Virtual SIMs\",\"authors\":\"M. Kasper, N. Kuntze, A. Schmidt\",\"doi\":\"10.1109/ICACT.2008.4493913\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The primary goal of this paper is to design a software replacement for a Subscriber Identity Module (SIM) based on the TCG MPWG Reference Architecture in order to access a mobile cellular network and its offered services. Therefor, we introduce a virtual software SIM (vSIM) with comparable usage and security characteristics like the traditional smartcard-based solution. Additionally, running a virtual SIM as a trusted and protected software on a mobile device allow significant expansion of services by introducing new usage scenarios and business models, cost reduction and more flexibility. Our approach demonstrates the substitutability of a SIM card with an adequate trusted software module supported and protected by a trustworthy operating system. In particular we propose several methods for authentication and enrollment of a subscriber.\",\"PeriodicalId\":448615,\"journal\":{\"name\":\"2008 10th International Conference on Advanced Communication Technology\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 10th International Conference on Advanced Communication Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACT.2008.4493913\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 10th International Conference on Advanced Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2008.4493913","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Subscriber Authentication in Cellular Networks with Trusted Virtual SIMs
The primary goal of this paper is to design a software replacement for a Subscriber Identity Module (SIM) based on the TCG MPWG Reference Architecture in order to access a mobile cellular network and its offered services. Therefor, we introduce a virtual software SIM (vSIM) with comparable usage and security characteristics like the traditional smartcard-based solution. Additionally, running a virtual SIM as a trusted and protected software on a mobile device allow significant expansion of services by introducing new usage scenarios and business models, cost reduction and more flexibility. Our approach demonstrates the substitutability of a SIM card with an adequate trusted software module supported and protected by a trustworthy operating system. In particular we propose several methods for authentication and enrollment of a subscriber.