2016
DOI: 10.1007/s11277-016-3326-5
|View full text |Cite
|
Sign up to set email alerts
|

SIMSec: A Key Exchange Protocol Between SIM Card and Service Provider

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 31 publications
0
11
0
Order By: Relevance
“…Various different models have been investigated to provide for secure communication of SIM technology. In some of these models, secret keys were assigned during production process [3][4][5][6][7][8]. However in [3], while secret keys weren't assigned during production process, it was proposed that keys that they developed assign exchange protocol stack to SIM technology for providing secure communication.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Various different models have been investigated to provide for secure communication of SIM technology. In some of these models, secret keys were assigned during production process [3][4][5][6][7][8]. However in [3], while secret keys weren't assigned during production process, it was proposed that keys that they developed assign exchange protocol stack to SIM technology for providing secure communication.…”
Section: Related Workmentioning
confidence: 99%
“…With the advances in communication technology, it has helped secure transactions such as mobile banking, mobile signature and mobile payment through the developing system. Thanks to these developments, cash out transactions, online shopping, credit card usage, online payments, e-commerce and the like can be secured safely via SIM on today's devices [1,2,3]. The secure provision of these services depends on the security of communications between the service providers and the SIM.…”
Section: Introductionmentioning
confidence: 99%
“…This study is concerning developing a brand new model to form personal electronic messaging network to transmit message contents over the network / computer network between client terminals. The chat electronic messaging setting showed a good potential to host real time interactive interaction system that is supported by RSA coding methodology to preserve the safety of the message stream [15] [16]. Choosing the key size in RSA coding is of nice importance because the size of the key will increase, the safety level of the system, the quality and also the resistance of encrypted text will increase [15] [17].…”
Section: Proposed Systemmentioning
confidence: 99%
“…In order to perform a secure communication design and minimize the risks between the smartphone user and service provider; different security mechanisms such as key management models, OTP (One-Time Password) services and encryption methods are implemented for mobile services. The encryption keys and related algorithms must be kept securely on mobile applications installed by the service providers on the smartphone (Ok et al, 2015;Ok et al, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…Without MNO approval, smartphone user is not allowed to install an application or to save any data onto the SIM card. When the capacity of the SIM card is available and MNO permission is obtained, additional value-added mobile applications can be installed onto the SIM card (Borst et al, 2001;Alliance, 2016;Ok et al, 2016). In this sense, the security needs of mobile services make SIM cards an important candidate for providing desired security infrastructure.…”
Section: Introductionmentioning
confidence: 99%