Abstract
In the current mobile communication networks, there is no undeniable evidence for calling information in the billing systems. Chen, Jan and Chen proposed a billing system by introducing a trusted third party—Observer and exploiting a hash chain mechanism. In this paper, we first identify some vulnerabilities in their mobile billing system. Then, we propose a fair and secure billing system based on a proper combination of digital signature and hash chain mechanism. The proposed system can achieve authentication, non-repudiation, and fairness, which are desirable security requirements for an undeniable mobile billing system. It is very efficient and applicable not only to the current GSM, but also to the 3GSM.
Similar content being viewed by others
References
Anderson, R. J., Manifavas, C., & Sutherland, C. (1997). Netcard—a practical electronic-cash system. In Proceedings of the International Workshop on Security Protocols (pp. 49–57), London, UK. Springer-Verlag.
Bellare, M., & Rogaway, P. (1997). Minimizing the use of random oracles in authenticated encryption schemes. In ICICS ’97: Proceedings of the First International Conference on Information and Communication Security (pp. 1–16), Beijing, China. Springer-Verlag.
Chen, L., Hitz, H. J., Horn, G., Howker, K., Kessler, V., Knudsen, L., & Mitchell, C. J. (1996). The use of trusted third parties and secure billing in umts. In Proceedings of ACTS Mobile Telecommunications Summit (pp. 493–499), Granada.
Chen Y.-Y., Jan J.-K., Chen C.-L. (2005) A fair and secure mobile billing system. Computer Networks 48(4): 517–524
Hauser, R., Steiner, M., & Waidner, M. (1996). Micro-payments based on iKP. Technical Report 2791, 12 February 1996.
Jutla, C., & Yung, M. (1996). Paytree: Amortized signature for flexible micropayments. In Proceedings of 2nd USENIX Workshop on Electronic Commerce (pp. 213–221).
Lamport L. (1981) Password authentication with insecure communication. Communications of the ACM 24(11): 770–772
Martin, K. M., Preneel, B., Mitchell, C. J., Hitz, H.-J., Horn, G., Poliakova, A., & Howard, P. (1998). Secure billing for mobile information services in umts. In IS&N ’98: Proceedings of the 5th International Conference on Intelligence and Services in Networks(pp. 535–548), London, UK. Springer-Verlag.
Merkle, R. C. (1989). A certified digital signature. In CRYPTO ’89: Proceedings on Advances in Cryptology (pp. 218–238), New York, USA. Springer-Verlag.
Rahnema M. (1993) Overview of the gsm system and protocol architecture. IEEE Communication Magazine 3: 92–100
Rivest, R. L., & Shamir, A. (1997). Payword and micromint: Two simple micropayment schemes. In Proceedings of the International Workshop on Security Protocols (pp. 69–87), London, UK. Springer-Verlag.
Shenker S., Clark D., Estrin D., Herzog S. (1996) Pricing in computer networks: Reshaping the research agenda. SIGCOMM Computer Communication Review 26(2): 19–43
Zhou, J., & Gollman, D. (1996). A fair non-repudiation protocol. In S&P ’96: Proceedings of the 1996 IEEE Symposium on Security and Privacy (p. 55), Washington, DC, USA. IEEE Computer Society.
Zhou, J., & Lam, K.-Y. (1998). Undeniable billing in mobile communication. In MobiCom ’98: Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (pp. 284–290), New York, USA. ACM Press.
3GPP TS 33.120 V4.0.0. 3g security—security principles and objectives (release 4). Technical report, March 2001.
3GPP TS 21.133 V4.1.0. 3g security—security threats and requirements (release 4). Technical report, December 2001.
3GPP TS 32.240 V8.2.00. Charging management; charging architecture and principles (release 8). Technical report, March 2008.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, S., Wang, G., Zhou, J. et al. Fair and Secure Mobile Billing Systems. Wireless Pers Commun 51, 81–93 (2009). https://doi.org/10.1007/s11277-008-9602-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-008-9602-2