Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Technologies in Mobile Networking

Security Technologies in Mobile Networking
View Free PDF
Author(s): Jonny Karlsson (Arcada Polytechnic, Finland), Göran Pulkkis (Arcada Polytechnic, Finland), Kaj J. Grahn (Arcada Polytechnic, Finland)and Robertino Hermansson (Arcada Polytechnic, Finland)
Copyright: 2007
Pages: 5
Source title: Managing Worldwide Operations and Communications with Information Technology
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59904-929-8.ch153
ISBN13: 9781599049298
EISBN13: 9781466665378


Specific security technologies for mobile applications and services – such as SIM/USIM/PKI SIM cards, hash chain generated security tokens for secure Mobile IP registration and mobile agent authorization, personal and public signature servers for mobile devices, and identity based public key cryptography - are surveyed. The Finnish mobile electronic identity case is presented as a case study. Two development proposals supporting the use of mobile certificates based on local PKI SIM access are outlined. The first proposal is a system providing a short-link communication channel between a PC application and a mobile phone PKI SIM. The other proposal is a prototype SIM enabling access from a mobile phone application. A test environment for Mobile IP security solutions using identity based public key cryptography is also proposed.

Body Bottom