Kerem Ok and Cem Cevikbas and Vedat Coskun and Mohammed Alsadi and Busra Ozdenizci
Security Analysis of SIMSec Protocol
329 - 332
2016
10
2
International Journal of Computer and Information Engineering
https://publications.waset.org/pdf/10003711
https://publications.waset.org/vol/110
World Academy of Science, Engineering and Technology
Unkeyed SIM cards do not contain the required security infrastructure to provide endtoend encryption with Service Providers. Hence, new, emerging, or smart services those require endtoend encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform endtoend data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.
Open Science Index 110, 2016