Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
PKI Implementation in Mobile Environment
Post: #1

[attachment=536]
PKI Implementation in Mobile Environment

Area : Information security

Introduction

In current mobile systems, some applications to some extent already use public key techniques and an underlying public key infrastructure (PKI) to provide end-to-end security, and such use is widely expected to grow. This project provides a step by step implementation of the security techniques and the entities that are involved in a PKI and describes how they are used in current mobile systems. Short Message Service has become a mass communication tool and has been broadly used in mobile applications like M-Commerce. The mobility, ubiquity and low cost of SMS messages make it become a very attractive bearer for mobile business applications. With the use of secure SMS technology, enterprises can let their employee access to the corporate resources anytime and anywhere in the world, within seconds of submission. The SMS has become a bearer for the e-commercial and e-governmental services such as electronic bank. The security issue of the SMS has often been considered as a crucial barrier to its application in many fields that need strong authentication and confidentiality. In this project, the main aim is to develop a PKI based solution for making mobile business applications satisfy the security requirements.

Objectives:

The aim of our work is to develop a PKI-based open framework for SMS service, which provides an end-to-end secure communication. Currently, most of the mobile phone do not offer any specific security features on SMS. By implementing PKI in SMS architecture, the problem such as eavesdropping, tampering, and impersonation can be overwhelmed. The secret end-to-end encryption will ensure the message to be read by the right person only. Personal or corporate private and confidential message can be retained. Public Key Infrastructure (PKI) is a proven solution for normal secure Internet communication encryption; it should be implementing on mobile SMS.
PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through the registration and issuance process, which, depending on the level of assurance the binding has, may be carried out by software at a CA, or under human supervision. The PKI role that assures this binding is called the Registration Authority (RA). For each user, the user identity, the public key, their binding, validity conditions and other attributes are made unforgeable in public key certificates issued by the CA.The term trusted third party (TTP) may also be used for certificate authority (CA). The term PKI is sometimes erroneously used to denote public key algorithms, which do not require the use of a CA
 

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  DESIGN AND IMPLEMENTATION OF GOLAY ENCODER AND DECODER computer science crazy 2 1,899 26-08-2016 03:46 PM
Last Post: anasek
  GSM based SCADA implementation using Microcontroller project report tiger 19 12,604 31-05-2016 12:13 PM
Last Post: dhanyavp
  WIRE LESS SPEED CONTROL OF AC MOTOR (USING MOBILE) smart paper boy 6 2,867 24-02-2016 02:05 PM
Last Post: seminar report asees
  Mobile incoming call indicator smart paper boy 5 4,594 09-01-2016 11:02 AM
Last Post: seminar report asees
  DESIGN AND IMPLEMENTATION OF ASYNCHRONOUS FIFO FOR EMBEDDED APPLICATIONS computer science crazy 1 2,317 14-04-2015 05:38 PM
Last Post: Guest
  Home appliance control by mobile phone (DTMF) seminar class 17 16,820 10-01-2015 10:05 PM
Last Post: seminar report asees
  COIN BASED MOBILE CHARGER full report seminar class 25 19,215 08-12-2014 11:40 PM
Last Post: seminar report asees
  wireless charging of mobile phones using microwaves ramki86 33 18,224 05-08-2014 09:29 PM
Last Post: seminar report asees
  SMS Based Wireless Electronic Notice Board using GSM/CDMA/3G Mobile Phone seminar class 20 15,796 30-04-2014 10:43 PM
Last Post: ShawnHasson
  mobile phone detector seminar presentation 22 11,174 20-02-2014 08:47 PM
Last Post: abid qureshi