LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Sabouri, A.; Komninos, N.; Douligeris, C. (2011)
Publisher: ICT
Languages: English
Types: Article
Subjects: QA76
In this paper we propose a user dependent scheme for enhancing security of the transmitted content in the future telecommunication systems. In order to achieve a higher level of security we introduce a scheme where the user identity gets involved in the encryption/decryption processes using an additional component for the block cipher which represents the user’s behavioural model. Applying such a scheme, in addition to introducing more difficulties to an attacker due to the user dependency of the cipher algorithm, gives the mobile operator the opportunity to ensure that a licensed service has not been shared by the customer. To show the feasibility of our approach we use the concept of invertible Boolean functions as an example.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Technical Report: Security Architecture in UMTS Third Generation Cellular Networks, 2004, http://ccc.inaoep.mx/Reportes/CCC-04-002.pdf.
    • [2] B. Sun, F. Yu, K. Wu, Y. Xiao, S. Member, and V. C. M. Leung, “Enhancing security using mobility-based anomaly detection in cellular mobile networks,” IEEE Transaction on Vehicular Technology, vol. 55, no. 4, pp. 1385-1396, 2006.
    • [3] ETSI Technical Specification, “ETSI TS 100.929, V8.0.0, Digital Cellular Telecommunications System (phase 2+)(GSM); Security related network functions,”2000.
    • [4] 3GPP Technical Specification, “3GPP TS 35.201 V9.0.0, Third Generation Partnership Project; Technical Specification Group; 3G Security; specification of the 3GPP confidentiality and integrity algorithms; document 1: f8 and f9 specification,” Dec 2009.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article