Cryptology ePrint Archive: Report 2007/337

Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)

W. Bamberger and O. Welter and S. Spitz and M. Marhöfer

Abstract: For ubiquitous communication self-organising ad-hoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to the Internet for external machines with low communication needs. A message-based approach is best in such a scenario with moving mobile phones and machines. In this paper we propose a security model for access control to the communication infrastructure, which is also message oriented. To meet the requirements of ubiquitously communicating machines, all algorithms on the sender's side are based on symmetric cryptography resulting in low computation requirements. Our sophisticated symmetric key infrastructure for access control is based on unique combinations of keys and is completed with an effective key management. This results in a carrier grade security level although many parties share the same keys. Adopting the Subscriber Identity Module as a secure storage and computing module achieves the trustworthiness of the mobile phone. This makes it possible to use the mobile phone not only as a user terminal but also as a trusted infrastructure component of the mobile network.

This document is an update of earlier work [BWS07] presented at the Workshop in Information Security Theory and Practices 2007 in Crete, Greece.

Category / Keywords: applications / Machine-to-machine communication, message-based communication, SIM, symmetric key infrastructure, shared secrets, message authentication codes

Date: received 28 Aug 2007

Contact author: walter bamberger at tum de

Available format(s): PDF | BibTeX Citation

Note: This document is an update of earlier work pre- sented at the Workshop in Information Security Theory and Practices 2007 in Crete, Greece (http://dx.doi.org/10.1007/978-3-540-72354-7_15).

Version: 20070829:054526 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]