Improved trust based key management for end-to-end secure communication in cellular networks

Naila Mukhtar*, M. S. Baig, L. A. Khan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Abstract

Use of mobile phones has tremendously increased over last two decades. Common man's life revolves around the usage of cell phones from payment of bills to secure conversation with family and friends. End-To-End Security is an important concern for such security critical applications with focus on key management. We have presented a model based on Web-of-trust style key management, with server involvement for mobile devices in cellular network environment. Our introduced server has some additive roles and responsibilities, which will help in efficient public key management by using the cellular network service. As public key cryptographic operations are computationally intensive, so proposed scheme is tested on mobile device for processing capability.
Original languageEnglish
Title of host publicationProceedings of the 8th International Conference on Security of Information and Networks
EditorsOleg Makarevich, Ludmila Babenko, Maxim Anikeev, Ronald Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet Orgun
Place of PublicationNew York
PublisherAssociation for Computing Machinery
Pages68-75
Number of pages8
ISBN (Electronic)9781450334532
DOIs
Publication statusPublished - 2015
Externally publishedYes
EventInternational Conference on Security of Information and Networks (8th : 2015) - Sochi, Russian Federation
Duration: 8 Sep 201510 Sep 2015
Conference number: 8th

Conference

ConferenceInternational Conference on Security of Information and Networks (8th : 2015)
Abbreviated titleSIN 2015
CountryRussian Federation
CitySochi
Period8/09/1510/09/15

Keywords

  • WOT
  • Key Management
  • End-to-End Security
  • Digital Certificates

Fingerprint Dive into the research topics of 'Improved trust based key management for end-to-end secure communication in cellular networks'. Together they form a unique fingerprint.

  • Cite this

    Mukhtar, N., Baig, M. S., & Khan, L. A. (2015). Improved trust based key management for end-to-end secure communication in cellular networks. In O. Makarevich, L. Babenko, M. Anikeev, R. Poet, A. Elçi, M. S. Gaur, & M. Orgun (Eds.), Proceedings of the 8th International Conference on Security of Information and Networks (pp. 68-75). New York: Association for Computing Machinery. https://doi.org/10.1145/2799979.2800014