5 research outputs found
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be
provided by the asymmetric key model. With the evolution of new applications
such as mobile commerce, it is essential to provide secure and efficient
solutions for the mobile environments. The traditional public key cryptography
involves huge computational costs and is not so suitable for the
resource-constrained platforms. The elliptic curve-based approaches as the
newer solutions require certain considerations that are not taken into account
in the traditional public key infrastructures. The main contribution of this
paper is to introduce a Lightweight Public Key Infrastructure (LPKI) for the
constrained platforms such as mobile phones. It takes advantages of elliptic
curve cryptography and signcryption to decrease the computational costs and
communication overheads, and adapting to the constraints. All the computational
costs of required validations can be eliminated from end-entities by
introduction of a validation authority to the introduced infrastructure and
delegating validations to such a component. LPKI is so suitable for mobile
environments and for applications such as mobile commerce where the security is
the great concern.Comment: 6 Pages, 6 Figure
On the Efficiency of Fast RSA Variants in Modern Mobile Phones
Modern mobile phones are increasingly being used for more services that
require modern security mechanisms such as the public key cryptosystem RSA. It
is, however, well known that public key cryptography demands considerable
computing resources and that RSA encryption is much faster than RSA decryption.
It is consequently an interesting question if RSA as a whole can be executed
efficiently on modern mobile phones. In this paper, we explore the efficiency
on modern mobile phones of variants of the RSA cryptosystem, covering CRT,
MultiPrime RSA, MultiPower RSA, Rebalanced RSA and R Prime RSA by comparing the
encryption and decryption time using a simple Java implementation and a typical
RSA setup.Comment: 5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS December 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis
Trust models for mobile content-sharing applications
Using recent technologies such as Bluetooth, mobile users can share digital content (e.g., photos, videos)
with other users in proximity. However, to reduce the cognitive load on mobile users, it is important that
only appropriate content is stored and presented to them.
This dissertation examines the feasibility of having mobile users filter out irrelevant content by running
trust models. A trust model is a piece of software that keeps track of which devices are trusted (for
sending quality content) and which are not. Unfortunately, existing trust models are not fit for purpose.
Specifically, they lack the ability to: (1) reason about ratings other than binary ratings in a formal way;
(2) rely on the trustworthiness of stored third-party recommendations; (3) aggregate recommendations
to make accurate predictions of whom to trust; and (4) reason across categories without resorting to
ontologies that are shared by all users in the system.
We overcome these shortcomings by designing and evaluating algorithms and protocols with which
portable devices are able automatically to maintain information about the reputability of sources of
content and to learn from each otherâs recommendations. More specifically, our contributions are:
1. An algorithm that formally reasons on generic (not necessarily binary) ratings using Bayesâ theorem.
2. A set of security protocols with which devices store ratings in (local) tamper-evident tables and
are able to check the integrity of those tables through a gossiping protocol.
3. An algorithm that arranges recommendations in a âWeb of Trustâ and that makes predictions of
trustworthiness that are more accurate than existing approaches by using graph-based learning.
4. An algorithm that learns the similarity between any two categories by extracting similarities between
the two categoriesâ ratings rather than by requiring a universal ontology. It does so automatically
by using Singular Value Decomposition.
We combine these algorithms and protocols and, using real-world mobility and social network data,
we evaluate the effectiveness of our proposal in allowing mobile users to select reputable sources of
content. We further examine the feasibility of implementing our proposal on current mobile phones by
examining the storage and computational overhead it entails. We conclude that our proposal is both
feasible to implement and performs better across a range of parameters than a number of current alternatives
A new architecture for secure two-party mobile payment transactions
xi, 229 leaves : ill. ; 29 cmThe evolution of wireless networks and mobile device technologies has increased concerns
about performance and security of mobile systems. We propose a new secured applicationlevel
architecture for a two-party mobile payment transaction that is carried out between a
resource-limited mobile device and a resource-rich computer server over wireless networks.
As an example of such transactions, the mobile banking transaction is focused on throughout
this thesis. The proposed architecture, namely SA2pMP, employs a lightweight cryptography
scheme (combining both a Public-key cryptography algorithm (ECDSA) and a
Symmetric-key cryptography algorithm (AES)), a multi-factor authentication mechanism,
and a transaction log strategy. The proposed architecture is designed to satisfy the four
properties of confidentiality, authentication, integrity and non-repudiation that are required
by any secure system. The architecture can be implemented on a Java ME enabled mobile
device. The security API library can be reused in implementing other two-party mobile
applications. The present study shows that SA2pMP is a unique lightweight security architecture
providing comprehensive security for two-party mobile payment transactions. In
addition, simulations demonstrate that SA2pMP can be installed in resource-limited mobile
devices as a downloadable software application. The main contribution of the thesis is to
suggest a design for a security architecture for two-party mobile payment transactions, for
example, mobile banking. It suggests a four-layer model of mobile payment participants,
based on Karnouskos (2004). This model clarifies how participants are involved in a mobile
payment transaction. In addition, an improved model is suggested to guide security
aspects of system design, which is based on an Onion Layer Framework (Wei, C.Liu, &
Koong, 2006)