Skip to main content

A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms

  • Conference paper
  • 961 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 255))

Abstract

In order to achieve secure access to mobile applications, in this paper, authentication scheme of application layer based on symmetric cryptography is proposed. In the scheme, seed key are pre-stored on both sides of the authentication. In the authentication process, one-time authentication code is generated by authentication protocol in SD key and certificated in authentication center to confirm the mobile user’s identity. Hardware encryption devices are utilized to store and protect seed key and authentication protocol by security mechanism of encryption devices. Analyses show that the scheme is efficient and safe.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zhang, R.:Research and Implementation on Mobile Payment System Based on SET Protocol. Northwest University. (2008)

    Google Scholar 

  2. Xiang, W., Tao, L., Wang, T.: Secure and efficient WTLS handshake protocol. J Comput. Appl. 28(11), 2798–2800 (2008)

    MATH  Google Scholar 

  3. Zhou, T., Li, Q., Zheng, D.: Wireless network mobile authentication protocol analysis and improvement. Comput. Appl. Software 29(3), 19–22 (2012)

    Google Scholar 

  4. Yu, D.: The Research of Sim Card Dignity Attestation System Based on Oms Mobile Terminal. Beijing University of Posts and Telecommunications. (2010)

    Google Scholar 

  5. Liu, N., Deng, Z.: Study on security problems and measures of mobile e-commerce based on short message service system. Inf. Secur. Technol. 3(9), 18–21 (2012)

    MathSciNet  Google Scholar 

  6. Liang, R., Lin, P.: Research intelligent terminal security based on sim cards. China New Telecommun. 14(12), 33–35 (2012)

    MathSciNet  Google Scholar 

  7. Zheng, Y., He, D.K., He, M.X.: Trusted computing based user authentication for mobile equipment. Chinese J. Comput. 29(8), 1255–1263 (2006)

    Google Scholar 

  8. Yan, S.: The Research and Implementation on Secure Access Solutions of Mobile Terminal Based on Smart Cards. Beijing Jiaotong University. (2008)

    Google Scholar 

  9. Zhao, Z.: The Research on Secure Access Solutions of Mobile Terminal Based on Encryption SD Cards. Department of Electric Engineering Southeast University. (2010)

    Google Scholar 

Download references

Acknowledgments

The authors wish to thank the helpful comments and suggestions from my director and colleagues in Beijing Key Laboratory of Network Cryptography Authentication. This work is supported by the Program of Large-scale Network Authentication Center affiliated to Beijing Municipal Institute of Science & Technology Information (No. PXM2012_178214_000005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ying Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Li, Y., Zhao, G., Du, L., Guo, J. (2014). A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Computer Science and Information Technology. Advances in Intelligent Systems and Computing, vol 255. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1759-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1759-6_16

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1758-9

  • Online ISBN: 978-81-322-1759-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics