WASET
	%0 Journal Article
	%A Kerem Ok and  Cem Cevikbas and  Vedat Coskun and  Mohammed Alsadi and  Busra Ozdenizci
	%D 2016
	%J International Journal of Computer and Information Engineering
	%B World Academy of Science, Engineering and Technology
	%I Open Science Index 110, 2016
	%T Security Analysis of SIMSec Protocol
	%U https://publications.waset.org/pdf/10003711
	%V 110
	%X Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.
	%P 329 - 332