Cryptology ePrint Archive: Report 2007/337
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)
W. Bamberger and O. Welter and S. Spitz and M. Marhöfer
Abstract: For ubiquitous communication self-organising ad-hoc networks become
more and more important. We consider mobile phones as appropriate
secure gateways to provide access to the Internet for external
machines with low communication needs. A message-based approach is
best in such a scenario with moving mobile phones and machines. In
this paper we propose a security model for access control to the
communication infrastructure, which is also message oriented. To
meet the requirements of ubiquitously communicating machines, all
algorithms on the sender's side are based on symmetric cryptography
resulting in low computation requirements. Our sophisticated
symmetric key infrastructure for access control is based on unique
combinations of keys and is completed with an effective key
management. This results in a carrier grade security level although
many parties share the same keys. Adopting the Subscriber Identity
Module as a secure storage and computing module achieves the
trustworthiness of the mobile phone. This makes it possible to use
the mobile phone not only as a user terminal but also as a trusted
infrastructure component of the mobile network.
This document is an update of earlier work [BWS07]
presented at the Workshop in Information Security Theory and
Practices 2007 in Crete, Greece.
Category / Keywords: applications / Machine-to-machine communication, message-based communication, SIM, symmetric key infrastructure, shared secrets, message authentication codes
Date: received 28 Aug 2007
Contact author: walter bamberger at tum de
Available formats: PDF | BibTeX Citation
Note: This document is an update of earlier work pre-
sented at the Workshop in Information Security Theory and
Practices 2007 in Crete, Greece (http://dx.doi.org/10.1007/978-3-540-72354-7_15).
Version: 20070829:054526 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]