IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure

Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure
View Sample PDF
Author(s): Teddy Mantoro (International Islamic University Malaysia, Malaysia), Admir Milišic (International Islamic University Malaysia, Malaysia)and Media Ayu (International Islamic University Malaysia, Malaysia)
Copyright: 2013
Pages: 18
Source title: Contemporary Challenges and Solutions for Mobile and Multimedia Technologies
Source Author(s)/Editor(s): Ismail Khalil (Johannes Kepler University Linz, Austria)and Edgar Weippl (Secure Business Austria - Security Research, Austria)
DOI: 10.4018/978-1-4666-2163-3.ch008

Purchase

View Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure on the publisher's website for pricing and purchasing information.

Abstract

The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be convenient, entailing ease of use and higher mobility. The suggested approach is to make use of the already popular mobile phone and to involve the mobile network, benefiting from Subscriber Identity Module (SIM) card’s tamper resistance to become trusted entities guarding personal information and identifying users. Mobile phone’s SIM card is convenient for safely storing security parameters essential for secured communication. It becomes secure entity compulsory for getting access to privacy sensitive Internet applications, like those involving money transfers. Utilizing the NFC interface passes the personal user keys only when needed, giving additional strength to the traditional public key cryptography approach in terms of security and portability.

Related Content

Tapan Kumar Behera. © 2023. 20 pages.
B. Narendra Kumar Rao. © 2023. 17 pages.
Blendi Rrustemi, Deti Baholli, Herolind Balaj. © 2023. 18 pages.
Alma Beluli. © 2023. 11 pages.
Jona Ndrecaj, Shkurte Berisha, Erita Çunaku. © 2023. 15 pages.
Yllka Totaj. © 2023. 12 pages.
Hla Myo Tun, Devasis Pradhan. © 2023. 31 pages.
Body Bottom