Abstract | ||
---|---|---|
In this paper we propose a user dependent scheme for enhancing security of the transmitted content in the future telecommunication systems. In order to achieve a higher level of security we introduce a scheme where the user identity gets involved in the encryption/decryption processes using an additional component for the block cipher which represents the user's behavioural model. Applying such a scheme, in addition to introducing more difficulties to an attacker due to the user dependency of the cipher algorithm, gives the mobile operator the opportunity to ensure that a licensed service has not been shared by the customer. To show the feasibility of our approach we use the concept of invertible Boolean functions as an example. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/CTS.2011.5898962 | ICT |
Keywords | Field | DocType |
cryptography,mobile communication,telecommunication security,behavioural model,block cipher,cipher algorithm,encryption-decryption process,future mobile telecommunication system security,licensed service,mobile operator,transmitted content,user dependency,user dependent cryptography,user identity,behavioral model box,gsm,behavior modeling,mobile telecommunication,encryption,mobile computing,authentication | Mobile computing,Cipher,Block cipher,Mobile station,Computer science,Cryptography,Computer security,Computer network,Encryption,Triple DES,Mobile telephony | Conference |
ISBN | Citations | PageRank |
978-1-4577-0025-5 | 0 | 0.34 |
References | Authors | |
10 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sabouri, A. | 1 | 0 | 0.34 |
Nikos Komninos | 2 | 208 | 16.34 |
Douligeris, C. | 3 | 5 | 1.82 |