PKI Implementation in Mobile Environment
#1

[attachment=536]
PKI Implementation in Mobile Environment

Area : Information security

Introduction

In current mobile systems, some applications to some extent already use public key techniques and an underlying public key infrastructure (PKI) to provide end-to-end security, and such use is widely expected to grow. This project provides a step by step implementation of the security techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. Short Message Service has become a mass communication tool and has been broadly used in mobile applications like M-Commerce. The mobility, ubiquity and low cost of SMS messages make it become a very attractive bearer for mobile business applications. With the use of secure SMS technology, enterprises can let their employee access to the corporate resources anytime and anywhere in the world, within seconds of submission. The SMS has become a bearer for the e-commercial and e-governmental services such as electronic bank. The security issue of the SMS has often been considered as a crucial barrier to its application in many fields that need strong authentication and confidentiality. In this project, the main aim is to develop a PKI based solution for making mobile business applications satisfy the security requirements.

Objectives:

The aim of our work is to develop a PKI-based open framework for SMS service, which provides an end-to-end secure communication. Currently, most of the mobile phone do not offer any specific security features on SMS. By implementing PKI in SMS architecture, the problem such as eavesdropping, tampering, and impersonation can be overwhelmed. The secret end-to-end encryption will ensure the message to be read by the right person only. Personal or corporate private and confidential message can be retained. Public Key Infrastructure (PKI) is a proven solution for normal secure Internet communication encryption; it should be implementing on mobile SMS.
PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through the registration and issuance process, which, depending on the level of assurance the binding has, may be carried out by software at a CA, or under human supervision. The PKI role that assures this binding is called the Registration Authority (RA). For each user, the user identity, the public key, their binding, validity conditions and other attributes are made unforgeable in public key certificates issued by the CA.The term trusted third party (TTP) may also be used for certificate authority (CA). The term PKI is sometimes erroneously used to denote public key algorithms, which do not require the use of a CA
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: uniqueness of mobile radio environment pdf, discuss pki public key infrastructure and how it works ppt, roman catholic teachings on the environment, how pki works ppt, pki encryption today, uniqueness of mobile radio environment ppt, environment,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DESIGN AND IMPLEMENTATION OF GOLAY ENCODER AND DECODER computer science crazy 2 23,326 26-08-2016, 03:46 PM
Last Post: anasek
  GSM based SCADA implementation using Microcontroller project report tiger 19 27,550 31-05-2016, 12:13 PM
Last Post: dhanabhagya
  WIRE LESS SPEED CONTROL OF AC MOTOR (USING MOBILE) smart paper boy 6 11,216 24-02-2016, 02:05 PM
Last Post: seminar report asees
  Mobile incoming call indicator smart paper boy 5 5,753 09-01-2016, 11:02 AM
Last Post: seminar report asees
  DESIGN AND IMPLEMENTATION OF ASYNCHRONOUS FIFO FOR EMBEDDED APPLICATIONS computer science crazy 1 22,632 14-04-2015, 05:38 PM
Last Post: Guest
  Home appliance control by mobile phone (DTMF) seminar class 17 18,898 10-01-2015, 10:05 PM
Last Post: seminar report asees
  COIN BASED MOBILE CHARGER full report seminar class 25 22,991 08-12-2014, 11:40 PM
Last Post: seminar report asees
  wireless charging of mobile phones using microwaves ramki86 33 21,415 05-08-2014, 09:29 PM
Last Post: seminar report asees
  SMS Based Wireless Electronic Notice Board using GSM/CDMA/3G Mobile Phone seminar class 20 18,260 30-04-2014, 10:43 PM
Last Post: ShawnHasson
  mobile phone detector seminar presentation 22 13,101 20-02-2014, 08:47 PM
Last Post: abid qureshi

Forum Jump: