Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure Mobile Service-Oriented Architecture
KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture. (NSLab)
2012 (English)Doctoral thesis, monograph (Other academic)
Abstract [en]

Mobile transactions have been in development for around ten years. More and more initiatives and efforts are invested in this area resulting in dramatic and rapid development and deployment of mobile technologies and applications. However, there are still many issues that hinder wider deployment and acceptance of mobile systems, especially those handling serious and sensitive mobile transactions. One of the most important of them is security.This dissertation is focused on security architecture for mobile environments. Research issues addressed in this dissertation are based on three currently important groups of problems: a) lack of an open, comprehensive, adaptable and secure infrastructure for mobile services and applications; b) lack of standardized solutions for secure mobile transactions, compliant with various regulatory and user requirements and applicable to different types of popular mobile devices and hardware/software mobile platforms; and c) resource limitations of mobile devices and mobile networks.The main contribution of this dissertation is large-scale, secure service-oriented architecture for mobile environments. The architecture structures secure mobile transaction systems into seven layers, called trusted stack, which is equivalent to ISO/OSI layered networking model. These layers are, starting from the bottom: 1) secure element (chip) layer, 2) applets layer, 3) middleware layer, 4) mobile applications layer, 5) communication layer, 6) services broker layer, and 7) mobile service provider layer. These seven layers include all necessary components required for implementation and operations of secure mobile transaction systems and therefore provide a framework for designing and implementing such systems.Besides the architecture, four types of security services necessary and critical for serious mobile transactions, have also been designed and described in the dissertation. These services are: (1) mobile registration and identity management; (2) mobile PKI; (3) mobile authentication and authorization; and (4) secure messaging. These services are lightweight, therefore suitable for mobile environments, technologies and applications, and also compliant with existing Internet security standards.Finally, as the proof of correctness of the proposed concept and methodology, a prototype system was also developed based on the designed security architecture. The system provides comprehensive security services mentioned above to several types of mobile services providers: mobile banking, mobile commerce, mobile ticketing, and mobile parking. These types of providers have been selected only as currently the most popular and representative, since the architecture is applicable to any other type of mobile service providers.

Place, publisher, year, edition, pages
Stockholm: KTH Royal Institute of Technology, 2012. , 153 p.
Series
Trita-ICT-COS, ISSN 1653-6347 ; 12:02
Keyword [en]
Secure, Mobile, Service-Oriented Architecture (SOA)
National Category
Communication Systems
Research subject
SRA - ICT
Identifiers
URN: urn:nbn:se:kth:diva-95328ISBN: 978-91-7501-351-0 (print)OAI: oai:DiVA.org:kth-95328DiVA: diva2:527836
Public defence
2012-06-08, Sal/Hall D, KTH-ICT, Forum, Isafjordsgatan 39, Kista, 13:00 (English)
Opponent
Supervisors
Available from: 2012-05-24 Created: 2012-05-22 Last updated: 2012-05-24Bibliographically approved

Open Access in DiVA

Dissertation(4367 kB)6490 downloads
File information
File name FULLTEXT01.pdfFile size 4367 kBChecksum SHA-512
89b98b34eabd1bc976fbca472df0873300560e85cb50e60ad8a184f53a5d6668449dcb7ee88fb773ad28084310a5f69e49911c6bb3809fff208346bc8d68e493
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Zhang, Feng
By organisation
Communication: Services and Infrastucture
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 6490 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 1227 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf