Saxena, Neetesh ORCID: https://orcid.org/0000-0002-6437-0807, Conti, Mauro, Choo, Kim-Kwang Raymond and Chaudhari, Narendra S. 2019. BAS-VAS: A novel secure protocol for value added service delivery to mobile devices. IEEE Transactions on Information Forensics and Security 15 , pp. 1470-1485. 10.1109/TIFS.2019.2940908 |
Preview |
PDF
- Accepted Post-Print Version
Download (595kB) | Preview |
Abstract
Mobile operators offer a wide range of valueadded services (VAS) to their subscribers (i.e., mobile users), which in turn generates around 15% of the telecommunication industry revenue. However, simultaneous VAS requests from a large number of mobile devices to a single server or a cluster in an internet-of-things (IoT) environment could result in an inefficient system, if these requests are handled one at a time as the present traditional cellular network scenario is. This will not only slow down the server’s efficiency but also adversely impacts the performance of the network. The current (insecure) practice of transmitting user identity in plaintext also results in traceability. In this paper, we introduce the first known protocol designed to efficiently handle multiple VAS requests at one time, as well as ensuring the secure delivery of the services to a large number of requesting mobile users. The proposed batch verification protocol (BAS-VAS) is capable of authenticating multiple simultaneous requests received by a large number of mobile users. We demonstrate that the protocol preserves user privacy over the network. The provider’s servers ensure the privacy of the requested service’s priority by performing sorting over encrypted integer data. The simulation results also demonstrate that the proposed protocol is lightweight and efficient in terms of communication and computation overheads, protocol execution time, and batch and re-batch verification delay. Specifically, we perform batch and re-batch verification (after detecting and removing malicious requests from the batch) for multiple requests in order to improve the overall efficiency of the system, as well as discussing time, space and cost complexity analysis, along with the security proof of our protocol using Proverif.
Item Type: | Article |
---|---|
Date Type: | Publication |
Status: | Published |
Schools: | Computer Science & Informatics |
Publisher: | Institute of Electrical and Electronics Engineers (IEEE) |
ISSN: | 1556-6013 |
Date of First Compliant Deposit: | 14 November 2019 |
Date of Acceptance: | 2 September 2019 |
Last Modified: | 30 Nov 2024 04:30 |
URI: | https://orca.cardiff.ac.uk/id/eprint/126788 |
Citation Data
Cited 4 times in Scopus. View in Scopus. Powered By Scopus® Data
Actions (repository staff only)
Edit Item |