Public Key Digital Authentication in Mobile Communication

  • Guofang ZhangEmail author
  • Quanjun Zheng
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1146)


The mobile wireless terminals visit website of internet by WAP gateway, the HTML form information of website in internet will be transformed into WML form information in WAP gateway. So the WAP gateway is often the object attacked by hackers. Once the WAP was attacked, this would lead to data breach. User data leakage incident directly restricts the development of ecommerce, endangering the safety of user’s personal information. In this paper, we use the public key digital fingerprint technology to protect mobile data. A new system of bidirectional identity authentication was built. The system realizes the security communication between the wireless terminal and internet server.


Authentication WPKI Encryption 



This paper is Supported by “Hainan Provincial Natural Science Foundation of China: 618MS080”.


  1. 1.
    Street, M.D.: Interoperability and international operation: an introduction to end mobile security. In: IEE Secure GSM and Beyond: End to End Security for Mobile Communications, pp. 1/1–1/5 (2003)Google Scholar
  2. 2.
    Rahnema, M.: Overview of the GSM system and protocol architecture. IEEE Commun. 31(4), 92–100 (1993)CrossRefGoogle Scholar
  3. 3.
    Rahman, M.G., Imai, H.: Security in wireless communication. Wirel. Pers. Commun. 22(2), 213–228 (2002)CrossRefGoogle Scholar
  4. 4.
    Doraswarm, N., Harkins, D.: IPsec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks. Prentice Hall, London (2003)Google Scholar
  5. 5.
    Frodigh, M., Parkvall, S., Roobol, C., et al.: Future-generation wireless networks. IEEE Pers. Commun. Mag. 8(5), 10–17 (2001)CrossRefGoogle Scholar
  6. 6.
    Park, D.G., Boyd, C., Moon, S.J.: Forward secrecy and its application to future mobile communications security. In: Blaze, M. (ed.) Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptosystems, pp. 433–445. Springer, Berlin (2000)CrossRefGoogle Scholar
  7. 7.
    Harn, L., Hsin, W.-J.: On the security of wireless network access with enhancements. In: Douglas Maughan, W., Perrig, A. (eds.) Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, pp. 88–95. ACM Press (2003)Google Scholar
  8. 8.
    Sun, H.M.: An efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4), 958–961 (2000)CrossRefGoogle Scholar
  9. 9.
    Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical to remote authentication: smart card. Comput. Secur. 21(4), 372–375 (2002)CrossRefGoogle Scholar
  10. 10.
    Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2), 629–631 (2004)CrossRefGoogle Scholar
  11. 11.
    Gentry, C., Ramzan, Z.: Provable cryptographic security and its applications to mobile wireless computing. Wirel. Pers. Commun. 29(2), 191–203 (2004)CrossRefGoogle Scholar
  12. 12.
    Cheung, T.-W., Chanson, S.: Design and implementation of a PKI-based end-to-end secure infrastructure for mobile E-commerce. World Wide Web J. (WWWJ) 4(4), 3–7 (2002)zbMATHGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Hainan College of Software TechnologyQionghaiChina

Personalised recommendations