Planned maintenance
A system upgrade is planned for 24/9-2024, at 12:00-14:00. During this time DiVA will be unavailable.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure Mobile Social Networks using USIM in a Closed Environment
Blekinge Institute of Technology, School of Computing.ORCID iD: 0009-0004-2874-0403
Blekinge Institute of Technology, School of Computing.ORCID iD: 0000-0001-8929-4911
2012 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices. Basic security mechanisms normally based on passwords for the authentication of social-network users are widely deployed and poses a threat for the user security. In particular, for dedicated social groups with high confidentiality and privacy demands, stronger and user friendly principles for the authentication and identification of group members are needed. On the other hand, most of the mobile units already provide strong authentication procedures through the USIM/ISIM module. This paper explores how to build an architectural framework for secure enrolment and identification of group members in dedicated closed social groups using the USIM/SIM authentication and in particular, the 3GPP Generic Authentication Architecture (GAA), which is built upon the USIM/SIM capabilities. One part of the research is to identify the marketable use-cases with corresponding security challenges to fulfil the requirements that extend beyond the online connectivity. This paper proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have also implemented an initial proof of the concept prototype to simulate the secure identification procedure based on the proposed design. Our implementation has demonstrated the flexibility of the solution to be applied independently for applications requiring secure identification.

Place, publisher, year, edition, pages
London: IEEE , 2012.
Keywords [en]
Mobile Social Networks, Information Security, Secure Identification
National Category
Telecommunications
Identifiers
URN: urn:nbn:se:bth-6946ISI: 000317120000069Local ID: oai:bth.se:forskinfoF798F6A7CE17293CC1257B9B00284380ISBN: 978-1-4673-5325-0 (print)OAI: oai:DiVA.org:bth-6946DiVA, id: diva2:834501
Conference
7th International Conference for Internet Technology and Secured Transactions (ICITST)
Available from: 2013-07-01 Created: 2013-07-01 Last updated: 2024-02-05Bibliographically approved

Open Access in DiVA

No full text in DiVA

Authority records

Nawaz, OmerFiedler, Markus

Search in DiVA

By author/editor
Nawaz, OmerFiedler, Markus
By organisation
School of Computing
Telecommunications

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 75 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf