Abstract
In order to achieve secure access to mobile applications, in this paper, authentication scheme of application layer based on symmetric cryptography is proposed. In the scheme, seed key are pre-stored on both sides of the authentication. In the authentication process, one-time authentication code is generated by authentication protocol in SD key and certificated in authentication center to confirm the mobile user’s identity. Hardware encryption devices are utilized to store and protect seed key and authentication protocol by security mechanism of encryption devices. Analyses show that the scheme is efficient and safe.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhang, R.:Research and Implementation on Mobile Payment System Based on SET Protocol. Northwest University. (2008)
Xiang, W., Tao, L., Wang, T.: Secure and efficient WTLS handshake protocol. J Comput. Appl. 28(11), 2798–2800 (2008)
Zhou, T., Li, Q., Zheng, D.: Wireless network mobile authentication protocol analysis and improvement. Comput. Appl. Software 29(3), 19–22 (2012)
Yu, D.: The Research of Sim Card Dignity Attestation System Based on Oms Mobile Terminal. Beijing University of Posts and Telecommunications. (2010)
Liu, N., Deng, Z.: Study on security problems and measures of mobile e-commerce based on short message service system. Inf. Secur. Technol. 3(9), 18–21 (2012)
Liang, R., Lin, P.: Research intelligent terminal security based on sim cards. China New Telecommun. 14(12), 33–35 (2012)
Zheng, Y., He, D.K., He, M.X.: Trusted computing based user authentication for mobile equipment. Chinese J. Comput. 29(8), 1255–1263 (2006)
Yan, S.: The Research and Implementation on Secure Access Solutions of Mobile Terminal Based on Smart Cards. Beijing Jiaotong University. (2008)
Zhao, Z.: The Research on Secure Access Solutions of Mobile Terminal Based on Encryption SD Cards. Department of Electric Engineering Southeast University. (2010)
Acknowledgments
The authors wish to thank the helpful comments and suggestions from my director and colleagues in Beijing Key Laboratory of Network Cryptography Authentication. This work is supported by the Program of Large-scale Network Authentication Center affiliated to Beijing Municipal Institute of Science & Technology Information (No. PXM2012_178214_000005).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Li, Y., Zhao, G., Du, L., Guo, J. (2014). A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Computer Science and Information Technology. Advances in Intelligent Systems and Computing, vol 255. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1759-6_16
Download citation
DOI: https://doi.org/10.1007/978-81-322-1759-6_16
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1758-9
Online ISBN: 978-81-322-1759-6
eBook Packages: EngineeringEngineering (R0)