2016
DOI: 10.3390/sym8090085
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

Abstract: Abstract:Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into differen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 50 publications
0
8
0
Order By: Relevance
“…Sakalauskas et al improved upon an asymmetric cipher based on the matrix power function (see [18]) to avoid a successful discrete logarithm attack against the original version. Ramadan et al published a survey of public key infrastructure (PKI)-based security for mobile systems (see [19]) covering aspects such as authentication, key agreement, and privacy. Qiao et al described a black-box traceable ciphertext-policy attribute-based encryption (CP-ABE, see [20,21]) that is scalable and efficient and, therefore, better suited for cryptographic cloud storage.…”
Section: Related Workmentioning
confidence: 99%
“…Sakalauskas et al improved upon an asymmetric cipher based on the matrix power function (see [18]) to avoid a successful discrete logarithm attack against the original version. Ramadan et al published a survey of public key infrastructure (PKI)-based security for mobile systems (see [19]) covering aspects such as authentication, key agreement, and privacy. Qiao et al described a black-box traceable ciphertext-policy attribute-based encryption (CP-ABE, see [20,21]) that is scalable and efficient and, therefore, better suited for cryptographic cloud storage.…”
Section: Related Workmentioning
confidence: 99%
“…This is briefly the impersonation problem. Since this is a core attack in a public key infrastructure, many applications are in danger of being attacked [2]. We therefore need a…”
Section: Introductionmentioning
confidence: 99%
“…In this part, we evaluate the efficiency of ESE-EPS AKA protocol compared with the original EPS AKA and SEPS AKA in [9] which is the most efficient scheme from a survey of the most recent and important works on AKA techniques based on PKI in [2] as mentioned above. Bandwidth consumption and computational cost as the two comparison criteria will be discussed, respectively.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Nevertheless, the 3G security construction primarily aims at improving the system flexibility and adaptability to new challenges instead of providing complete security [2]. There are still some flaws in the security protocol such as easiness of the subscriber's identity leakage, the operation difficulty of sequence number etc.…”
mentioning
confidence: 99%
See 1 more Smart Citation