Efficient Attribute Authentication in Wireless Mobile Networks

  • Jaeil Lee
  • Inkyoung Jeun
  • Seoklae lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4331)


Recent e-commerce requires an attribute authentication that provides users with distinctive and unique internet service, as well as user identification. Despite widespread awareness of the importance of attribute authentication, the attribute authentication service is not yet used widely due to it’s inconvenience and inefficiency. These defects especially has a bad effect to mobile users in wireless networks. This paper described the weakness of current attribute authentication mechanisms and proposed a Public Key Certificate(PKC)-based attribute authentication model considering an efficiency and convenience. The user who has a PKC in a mobile device can use the efficient attribute authentication without additional procedure.


Wireless Network Internet Service Attribute Information Access Control Model Wireless Mobile Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    ECOM(Next Generation Electronic Commerce Promotion Council of Japan),Attribute Authentication Handbook (2005), http://www.ecom.jp
  2. 2.
    Housley, R., et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC3280, IETF (April 2002)Google Scholar
  3. 3.
    Farrel, S., et al.: An Internet Attribute Certificate Profile for Authorization, RFC3281, IETF (April 2002)Google Scholar
  4. 4.
    Oppliger, R., et al.: Using Attribute Certificates to Implement Role Based Authorization and Access Control Models, In: SIS 2000, (October 2000)Google Scholar
  5. 5.
    Kambourakis, G., et al.: Introducing Attribute Certificates to Secure Distributed E-learning or M-learning Serivces. In: WEB 2004 (February 2004)Google Scholar
  6. 6.
    ITU-T Recommendation X.509 (1997) | ISO/IEC 9594-8:1998, Information technology - Open Systems Interconnection - The Directory : Authentication Framework (1998)Google Scholar
  7. 7.
    Myers, M., et al.: Internet X.509 Public Key Infrastructure Online Certificate Status Protocol-OCSP, RFC2560, IETF (June 1999)Google Scholar
  8. 8.
    Jakobsson, M.: Efficient Attribute Authentication with Applications to AdHoc Networks. ACM Press, New York (2004)Google Scholar
  9. 9.
    ISO/TS, Health Informatics-Public Key Infrastructure - Part2 : Certificate Profile, ISO/TS 17090-2 (2002)Google Scholar
  10. 10.
    ECOM(Next Generation Electronic Commerce Promotion Council of Japan), Handbook of Attribute (2005), http://www.ecom.jp

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jaeil Lee
    • 1
  • Inkyoung Jeun
    • 1
  • Seoklae lee
    • 1
  1. 1.Korea Information Security AgencySeoulKorea

Personalised recommendations