Monday, August 26, 2019

Cellular Authentication For Mobile and Internet Services (Free PDF)

File Size: 2.35 Mb

Like many useful and successful systems, the Internet was not designed with security in mind. Consequently, authentication on the Internet has been a vexing problem ever since it was opened up to the larger public in the early 1990s. The fact that most computers on the Internet are general-purpose devices has made this problem more acute. Peter Steiner’s famous New Yorker cartoon with the caption ‘On the Internet, nobody knows you are a dog’ continues to remain apt. However, there is an existing useful and successful system that has struck the right balance among security, cost, and usability: this is the worldwide cellular authentication infrastructure. This is the infrastructure that allows a mobile network subscriber to travel halfway across the world, have the local mobile network operator authenticate the subscriber, provide cellular services, and subsequently charge him for those services. Naturally, many people have wondered whether it is possible to use this large-scale infrastructure to secure services on the Internet. Already in the late 1990s, there were examples of using short message service (SMS) messages to pay for soda on a vending machine. These are ad hoc means of bootstrapping security for new applications from the existing cellular security infrastructure.

Back in 2000, we started to think about designing a systematic approach to bootstrap cellular authentication for Mobile and Internet Services. What began as a small Nokia Research Center project grew into a standardization work item in 3rd Generation Partnership Project (3GPP). The first version of the standardization of the basic Generic Authentication Architecture (GAA) features was completed in 2006. Two lead applications for GAA emerged: Multimedia Broadcast/Multicast Services specified by 3GPP and Smart Card Profi le for broadcast Mobile TV, specified by Open Mobile Alliance.

1. Introduction
2. Classical Approaches to Authentication and Key Agreement
3. Generic Authentication Architecture
4. Applications Using Generic Authentication Architecture
5. Guidance for Deploying GAA
6. Future Trends
Terminology and Abbreviations

Author Details
"Silke Holtmanns"

"Valtteri Niemi"

"Philip Ginzboorg"

"Pekka Laitinen"

"N. Asokan"

Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment