Académique Documents
Professionnel Documents
Culture Documents
ISSN (Online): 1985-2320 International Journal of Security (IJS) is published both in traditional paper form and in Internet. This journal is published at the website http://www.cscjournals.org, maintained by Computer Science Journals (CSC Journals), Malaysia.
This work is subjected to copyright. All rights are reserved whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illusions, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication of parts thereof is permitted only under the provision of the copyright law 1965, in its current version, and permission of use must always be obtained from CSC Publishers.
IJS Journal is a part of CSC Publishers http://www.cscjournals.org IJS Journal Published in Malaysia Typesetting: Camera-ready by author, data conversation by CSC Publishing Services CSC Journals, Malaysia
EDITORIAL PREFACE
This is the first issue of volume fifth of The International Journal of Security (IJS). The Journal is published bi-monthly, with papers being peer reviewed to high international standards. The International Journal of Security is not limited to a specific aspect of Security Science but it is devoted to the publication of high quality papers on all division of computer security in general. IJS intends to disseminate knowledge in the various disciplines of the computer security field from theoretical, practical and analytical research to physical implications and theoretical or quantitative discussion intended for academic and industrial progress. In order to position IJS as one of the good journal on Security Science, a group of highly valuable scholars are serving on the editorial board. The International Editorial Board ensures that significant developments in computer security from around the world are reflected in the Journal. Some important topics covers by journal are Access control and audit, Anonymity and pseudonym, Computer forensics, Denial of service, Network forensics etc. The initial efforts helped to shape the editorial policy and to sharpen the focus of the journal. Starting with volume 5, 2011, IJS appears in more focused issues. Besides normal publications, IJS intend to organized special issues on more focused topics. Each special issue will have a designated editor (editors) either member of the editorial board or another recognized specialist in the respective field. The coverage of the journal includes all new theoretical and experimental findings in the fields of computer security which enhance the knowledge of scientist, industrials, researchers and all those persons who are coupled with computer security field. IJS objective is to publish articles that are not only technically proficient but also contains information and ideas of fresh interest for International readership. IJS aims to handle submissions courteously and promptly. IJS objectives are to promote and extend the use of all methods in the principal disciplines of computer security. IJS editors understand that how much it is important for authors and researchers to have their work published with a minimum delay after submission of their papers. They also strongly believe that the direct communication between the editors and authors are important for the welfare, quality and wellbeing of the Journal and its readers. Therefore, all activities from paper submission to paper publication are controlled through electronic systems that include electronic submission, editorial panel and review system that ensures rapid decision with least delays in the publication processes. To build its international reputation, we are disseminating the publication information through Google Books, Google Scholar, Directory of Open Access Journals (DOAJ), Open J Gate, ScientificCommons, Docstoc and many more. Our International Editors are working on establishing ISI listing and a good impact factor for IJS. We would like to remind you that the success of our journal depends directly on the number of quality articles submitted for review. Accordingly, we would like to request your participation by submitting quality manuscripts for review and encouraging your colleagues to submit quality manuscripts for review. One of the great benefits we can provide to our prospective authors is the mentoring nature of our review process. IJS provides authors with high quality, helpful reviews that are shaped to assist authors in improving their manuscripts. Editorial Board Members International Journal of Security (IJS)
EDITORIAL BOARD
EDITOR-in-CHIEF (EiC) Dr. Wei Wang Norwegian University of Science and Technology (NTNU)(Norway)
ASSOCIATE EDITORS (AEiCs) Dr.Elena Irina Neaga Loughborough University United Kindom
Dr. Jianguo Ding University of Science and Technology Norway Dr.Lei Chen Sam Houston State University United States America Professor Hung-Min Sun National Tsing Hua University Taiwan
TABLE OF CONTENTS
Pages
1 - 12 A New Watermarking Approach Based on Combination of Reversible Watermarking and CDMA in Spatial and DWT Domain S.Bekkouche, A.Chouarfia An Exploratory Study of the Security Management Practices of Hispanic Students Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert Crossler, Jesus Tanguma
13- 21
22-34
35-61
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobile Networks Mustafa Fayomi, Jaafer AL-Saraireh
A New Watermarking Approach Based on Combination of Reversible Watermarking and CDMA in Spatial and DWT Domain
S.Bekkouche
University of Sciences and Technology Oran USTO Oran, 31100, Algeria
sbekkouche2008@gmail.com
A.Chouarfia
University of Sciences and Technology Oran USTO Oran, 31100, Algeria
chouarfia@univ-usto.dz
Abstract
Image watermarking can be defined as a technique that allows insertion of imperceptible and indelible digital data into an image. In addition to its initial application which is the copyright, watermarking can be used in other fields, particularly in the medical field in order to contribute to secure images shared on the network for telemedicine applications. In this report we study some watermarking methods and the comparison result of their combination, the first one is based on the CDMA (Code Division Multiple Access) in DWT(Discrete Wavelet Transform) domain, noted CDMA-DWT and CDMA in spatial domain, noted CDMA-SD and their aim are to verify the image authenticity whereas the second one is the reversible watermarking (the least significant bits LSB and cryptography tools) , the reversible carte mapping RCM their objective are to check the integrity of the image and to keep the Confidentiality of the patient data. A new scheme of watermarking is the combination of the reversible watermarking method and the method of CDMA-DWT and the second is the combination of the reversible watermarking and the method of CDMA-sp to verify the three security properties Integrity, Authenticity and Confidentiality of medical data and patient information. In the end, we made a comparison between these methods within the parameters of quality of medical images Initially, an in-depth study on the characteristics of medical images would contribute to improve these methods to measurements have been done on the watermarked image to verify that this technique does not lead to a wrong diagnostic. The robustness of the watermarked images against attacks has been verified on the parameters of PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error), MAE (Mean Absolute Error) and SNR (Signal to Noise Ratio ) which show that the resulting quality of combination watermarking method is good in DWT than other techniques. Keywords:
Confidentiality. Watermarking, Reversible watermarking, CDMA-DWT, Integrity, Authentication,
1. INTRODUCTION
Among the new technologies available to medical informatics some have a secondary impact because they are not specific to the medical field (optical disk, smart card). Others have an impact as it completely changes the use of computers particularly in hospitals. Among these, New network architectures will disrupt the manner to envisage the integration of HIS (Hospital Information Systems) and security of medical information. The diagnosis requires more and more exchanges of medical images from digital modalities and volumes (IRM, X-Scanner, nuclear medicine, etc...) Between public structure of care health facilities (university hospitals or departmental having high debit and allowing several remote experts to issue a notice for a better management of the patient. To stop the copying works of images and contribute to the Copyright Protection., new methods have been developed known more by watermarking. The watermarking is therefore proposed to ensure greater security by verifying image authentication and integrity, and on the other side, the patient information to be saved or transmitted in a confidential way in medical imagery. We will focus mainly on the watermarking images and medical data. Medical imagery is a field where the protection of the integrity and confidentiality of content is a critical issue due to the special characteristics derived from strict ethics, legislative and diagnostic implications. It is very important to prevent unauthorized manipulation and misappropriation of such digitized images. The risks are increased when dealing with an open environment like the internet. Medical images should be kept intact in any circumstance and before any operation they must be checked for: Integrity: that is the image or data has not been modified by non authorized people. Authentication: that is the image or data belongs indeed to the correct patient. Confidentiality: that is protection the medical image and patient information against attacks. Watermarking is a new technology which hopefully can help in that aim. Before applying watermarking techniques developed for medical imagery applications, it is important that the requirements imposed by medical images are carefully analyzed to investigate whether they are compatible with existing watermarking techniques. Different watermarking techniques have been proposed to address the problems of medical confidentiality protection and both origin and data authentication. In this work, a watermarking technique is adapted to provide the three properties of security authentication, confidentiality and integrity of medical image and patient information. This technique based on combination the CDMA-DWT [1] [10] and the reversible watermarking [2] [9] and. We will give in section 2 an overview of some reversible watermarking techniques and the desired functionalities of watermarking techniques are discussed in terms of medical images. In section 3, the new watermarking approach is presented as a well designed scheme for the medical field. We give the main functionalities of our security system. Finally, the experimental results are presented to validate the proposed approach.
2. WATERMARKING TECHNIQUES
Image watermarking is the process of embedding into image specific information that helps establishing the ownership of the image. Watermarking techniques are divided in two categories. Spatial Domain Watermarking, where the least significant bits is replaced with watermark, Frequency Domain Watermarking, where the image is first transformed to frequency domain and then the low frequency components are modified to contain the watermark. Watermarking can be applied in frequency domain by applying transforms like Discrete Fourier Transform (DFT) [13], Discrete Cosine Transform (DCT) [7] or the Discrete Wavelet Transform (DWT) [4][12]. Embedding the watermark in the frequency domain can provide more robustness than in the spatial domain. It is strong against attacks like compression where spatial domain is not. Image watermarking techniques can be distinguished according to the way the watermark is revealed
from the watermarked image. One way is by comparing this image to the original one, while the other doesnt resort to this comparison. The second are usually referred to as blind watermarking techniques and are preferable. Six different watermarking techniques each from different domain i.e. Spatial Domain and Wavelet Domain [10] watermarking have been chosen for the experiment. The techniques used for the comparative analysis of watermarking process are CDMA in spatial domain noted CDMASD, CDMA-DWT [1] [10], reversible watermarking [3] [10], RCM [8] [11], the reversible watermarking and the proposed approach which is the combination of the CDMA-DWT and the reversible watermarking. Previous work on embedding invisible watermarks can be broadly grouped into spatial domain and transform domain methods. Typically, the data used to represent the digital watermarks are a very small fraction of the host image data. Such signatures include, for example, pseudo-random numbers, trademark symbols and binary images. CDMA-SD method usually modifies the leastsignificant bits of the host image but the CDMA-DWT technique can be employing to scatter each of the bits randomly throughout the cover image. RCM is a simple integer transform that applies to pairs of pixels. For some pairs of pixels, RCM is invertible, even if the least significant bits (LSBs) of the transformed pixels are lost. The data space occupied by the LSBs is suitable for data hiding. The embedded information bit-rates of the proposed spatial domain reversible watermarking scheme are close to the highest bit-rates reported so far. The scheme does not need additional data compression, and, in terms of mathematical complexity, it appears to be the lowest complexity one proposed up to now. Reversible watermarking (RW) technique which lossless compress the bits to be affected by the embedding operation to preserve the original data and create space for the watermark. The compressed data and the watermark are then embedded into the host image. This practice of compressing original data for reversibility purpose has been widely adopted based on LSB and cryptography selects pixels or transformation coefficients, and then lossless compresses them so as to save space for the watermark. Therefore, it has the property that the embedding distortion can be completely removed from the watermarked image without any side channel. At the other side, the original host image can be recovered in its integrality.
3. PROPOSED APPROACH
3.1 Primary combination By applying the reversible watermarking(RW) [2] based on LSB bits and cryptography tools which give an image The method of CDMA-SD [3] is applied in this image for given a watermarked _image. a. Insertion process The insertion is the same of that the insertion reversible watermarking process which gives a result, considering this result as a new input or a new original image using the original watermarking dominates the CDMA in spatial domain. In the insertion process, we scan the image by rows and Lossless compress the bit-stream of LSB values as the image is scanned. Once this compressed bit-stream is obtained, we concatenate it with the encrypted patient information and hash the result of concatenation and embed it into the LSBs by scanning the image in the same pattern. The overall procedure is then a four steps process: (1) Calculate the authentication code (MAC) of the image Using SHA algorithm [7] (2) concatenate the authentication code and patient information and encrypt the resulting string; (3) Select the LSBs of all pixels and compress the resulting string using RLE algorithm [5]. (4) Concatenate the compressed string and the encrypted string and insert them back into the LSB locations by adding blanks if necessary which give a watermarked image1.
The insertion process of CDMA in spatial domain [3] was applied on the watermarked image1 for obtain the watermarked_ image. the insertion primary combination has been shown below in Figure1
Original image
Watermarked image1
Insertion CDMASD
Watermarked image
FIGURE1: Insertion primary combination process b- Extraction process - Using the step of the extraction CDMA process [3] on the watermarked image. - The result will be used as watermarked image1. - Applying extraction reversible watermarking process [2] on the watermarked image1 to extracting data from LSBs. - Convert binary to ASCII to get to "@" character represents the end of the data inserted. - Make a decoding key using the RSA inclusion K. - Separate the footprint (size unknown) of Patient data and calculate the footprint of image to obtain the original ones. The extraction primary combination has been shown below in Figure2 Extraction CDMASD Watermarked image
Watermarked Image 1
DH = DH + W DV = DV + W DD = DD + W
Note that the mark must be the same size as the details. - Reconstruction of the decomposed image which will give the watermarked image the inverse discrete wavelet transforms IDWT: = IDWT (IA, DH, DV, DD). The insertion process has been shown below in Figure1.
using
Original image
Watermarked image1
Insertion CDMADWT
Watermarked image
FIGURE1: Insertion second combination process b. Extraction process Using the extraction steps of the CDMA-DWT technique [1]. Generation of multilayer sequence with the same key insertion K. Decomposition of the image with the DWT into a single resolution level. Calculation of the correlation between multilayer sequence and three-layered image detail broken then the message is decoded. According to the sign of the correlation. The researched data is extracted three times thus allowing us to check and correct them. The result will be used as a watermarked Image Applying of extraction reversible watermarking method on the image result to get an original image. The extraction process has been shown below in Figure4 Extraction CDMADWT Watermarked image
Watermarked Image 1
(a)
FIGURE3 : An IRM medical image 4.2. Insertion and Extraction Data To insert the signature, the user must fill out the following input: the signature (64 bit) The secret key the number of layers used Upon insertion, the user gets the number of bits in the signature. This data is necessary for the detection phase. To detect the patient data the user must have: The marked image The key The number of embedded bits After the achievement of six techniques we compare them to evaluate the rate of evaluation of each it. 4.3. Discussion The comparative analysis of the six watermarking techniques has been done on the basis of noise and rotation attacks. Results of the individual watermarking technique have been compared on the basis of PSNR, MSE, MAE and SNR [6] given in Equations (1) to (4). The obtained PSNRs between original and watermarked images for the six techniques are used to measure the distortion caused by the watermarking. This ratio is often used as a quality measurement between the original and a watermarked image. If the PSNR is higher then the watermarked image quality is better. The PSNR is the square of ratio of maximum pixel value i.e. 255 to the MSE value. For a good image the SNR value must be high, according to the results established, we select the application field of the watermark where the luminance (Xmax) is maximum.
The MSE is used to quantify the distortion generated by the digital watermarking. In fact, we use an additive scheme to watermark the image. This modification could hinder the quality of the image. The equation (2) quantifies the mean absolute differences between original image and the watermarked image.
MSE = MAE =
I (i, j ) I
i j
(i, j )
PSNR = 10 log 10
M 1 N 1 N
SNR =
1 M 1
(4)
e
(I
Where
Is )
is watermarked image, MN is the image size. SNR 33.17 (dB) 29.04 (dB) 310.13 (dB) 38.71 (dB) 30.44 (dB) MSE 0.78 2.00 1.55e-02 0.213 1.45 MAE 0.78 1.002 6.75e01 0.213 0.228 Properties of Security Authentification Integrity and Confidentiality Integrity and Confidentiality Authentification Authentification, Integrity and Confidentiality Authentification, Integrity and Confidentiality
Reversible Watermarking (RW) CDMA-SD CDMA-DWT RCM Combinaison RW/CDMA-SD Combinaison RW/CDMA-DWT
49.20 (dB) 45.12 (dB) 66.22 (dB) 54.84 (dB) 46.51 (dB)
49.17 dB
1.265
0.7866
80.29
TABLE 1: Comparative parameters of the six techniques. 4.4. Noise Attacks on Watermarked Image The attack methodology on the watermarked image is based on the idea that an attacker does not have any access to the original image or the watermark image/signature. The attacks are, therefore, done on the watermarked image using only the watermarked image as input. The intruder, i.e. attacker, likely has no idea if the attack worked or not so the results are not known to the attacker. With addition of salt and pepper noise, performance of watermarking scheme is analyzed.
Salt and pepper noise: Figure 4 (d) and figure5 (d), shows the simulation results of watermarked image with salt and pepper noise at a gain factor of 0.02. 4.5. Results of Noise Attacks
(a)
(b)
(c)
(d)
(a)
(b)
(c)
(d)
FIGURE5: The combination RW/CDMA-DWT (a) Original image, (b)Watermarked Image after RW,
(c) Watermarked Image after RW/CDMA-DWT, (d) Noise watermarked Image The PSNR have been shown in Table 2 expressed in (dB) is calculated between the original image and noise Watermarked image.
Method Reversible watermarking (RW) RCM CDMA-SD in spatial domain CDMA-DWT RW/CDMA-SD Proposed approach PSNR (dB) 26.90 26.90 26.46 (dB) 26.7098 26.48 26.73 MSE 132.89 132.52 146.94 138.707 146.14 137.85
TABLE 2 : The Performance analysis of watermarking techniques against noise Attack 4.6. Results of Rotation Attack Rotation attack is among the most popular kinds of geometrical attack on digital multimedia images [8]. Three levels of rotations have been implemented. The original watermarked image is being rotated respectively by 90 degree, 180 degree and 270 degree. The rotation attack has been shown below in Figure 6.
(a)
(b)
(c)
(d)
10
(b) Watermarked image after 90 degree rotation, (c) Watermarked image after 180 (d) Watermarked image after 270 , . TABLE 3 : Performance analysis of watermarking techniques against rotation attack
The PSNR values in Table3 show that the combination watermarking in Wavelet domain technique is having the greatest value for the PSNR value. This shows that the wavelet domain watermarking is the best practice for the digital image watermarking purpose.
5. CONCLUSION
This paper proposed an efficient digital watermark scheme to increase security, authentication, confidentiality and integrity of medical image and patient information, to transmit it via internet based on combining two watermarking techniques. First technique uses a reversible watermarking by combine the least significant bit and cryptographies tools. Second technique uses the CDMA-DWT. domain. The watermark can be used to introduce the patient's information in a private and sure manner all while preserving the visual quality of watermarked image. The experimental results show that our scheme is highly robust against others of image processing operations such as salt and pepper noise. The simulation results show that high quality image i.e. watermarked image with high PSNR is obtained by embedding the watermark in DWT domain than other techniques presented in this article. The paper focuses on the robustness of the watermarking techniques chosen from all domains of watermarking against rotation attack. It seems that the proposed approach is best and most robust for medical images watermarking. This work could further be extended to the watermarking purpose of another digital content like audio and video.
25.81
(dB)
11
6. REFERENCES
[1] Chris Shoemaker, Hidden Bits: A Survey of Techniques for Digital Watermarking, Independent Study EER-290, 2002. [2] S. Boucherkha & M. Benmohamed, A lossless watermarking based authentication system for medical image, In International Journal of Signal Processing, Vol.1, N 2004. 4, [3] B. Vassaux, Technique multicouches pour le tatouage d'images et adaptation aux flux vido MPEG-2 et MPEG-4, Thse de Doctorat, Institut National Polytechnique Grenoble France, 2003. [4] Y.I. Khamlichi, M. Machkour, K. Afdel, A. Moudden, ' Medical Image Watermarked by Simultaneous Moment Invariants and Content-Based for Privacy and Tamper Detection', Proceedings of the 6th WSEAS International Conference on Multimedia Systems & Signal Processing, Hangzhou, China, April 16-18, pp109-113, 2006. [5] Rainer Steinwandt, Viktria I. Villnyi, "A one-time signature using run-length encoding", Journal Information processing Letters ,Volume 108 Issue 4,October ,2008. [6] B. Aiazzi, L. Alparone and S. Baronti. Near-lossless compression of 3-D optical data. IEEE Transactions on Geosciences and Remote Sensing, vol. 39, no 11, pp: 25472557, 2001. [7] Xu Yan-ping, Jia Li-qin,"Research of a Digital Watermarking Algorithm Based on Discrete Cosine Transform", Proceedings of the Third International Symposium on Electronic Commerce and Security Workshops(ISECS 10) Guangzhou China 29-31 July 2010 pp 373375 [8] Ping Dong, Jovan G. Brankov, Nikolas P. Galatsanos, Yongyi Yang, Franck Davoine, Digital Watermarking Robust to Geometric Distortions, IEEE Transactions on Image Processing, Vol. 14, NO. 12, December, 2005. [9] YongJie Wang, Yao Zhao, Jeng-Shyang Pan and ShaoWei Weng,"A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression ", Volume 3682/2005, pp: 1168-1174, DOI: 10.1007/11552451_161, Computer Science, 2005. [10] Harsh K Verma1, Abhishek Narain Singh, Raman Kumar, Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack", International Journal of Computer Science and Information Security, Vol. 5, No. 1, 2009. [11] Yeh-Shun Chen, Ran-Zan Wang, Yeuan-Kuen Lee, Shih-Yu Huang "Steganalysis of Reversible Contrast Mapping Watermarking", Proceedings of the World Congress on Engineering 2008, Vol 1, WCE 2008, July 2 - 4, 2008, London, U.K [12] W.-T. Huang, S-Y. Tan, Y.-J Chang and C.-H. Chen, A robust watermarking technique for copyright protection using discrete wavelet transform, WSEAS Trans. Computers, vol. 9, no. 5, pp. 485-495, 2010.
12
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert E. Crossler & Jesus Tanguma
ywu@utpa.edu
andohbaidoof@utpa.edu
Robert E. Crossler
College of Business Administration Department of Computer Information Systems & Quantitative Methods University of Texas-Pan American Edinburg, 78539, USA
recrossler@utpa.edu
Jesus Tanguma
College of Business Administration Department of Computer Information Systems & Quantitative Methods University of Texas-Pan American Edinburg, 78539, USA
tangumaj@utpa.edu
Abstract The growing Internet and mobile technologies create opportunities for efficient communication and coordination among individuals and institutions. However, these technologies also pose security challenges. Although users understanding and behavior towards security solutions have been recognized as critical to ensuring effective security solutions, few research articles have examined user security management practices. The literature lacks empirical research that examines users everyday behavior and practices to managing security. In an effort to bridge the gap in user security management practices, this paper presents an exploratory study of how Hispanic college students manage the security of their computer systems. Specifically, we examine how ethnicity, gender, and age influence users behavior towards updating their operating systems, non-operating system software and antivirus definitions. The results reveal that gender influences the frequency of updating operating systems, antivirus definitions and nonoperating system software, whereas ethnicity and age influence only frequency of update of operating systems but not the frequency of update of non-operating system software and antivirus definitions. Keywords: Non-operating System Software, Antivirus Software, Security Practices, Software Update, Users Security Management, Hispanic.
1. INTRODUCTION
Even as the Internet and mobile technologies facilitate electronic commerce and effective global coordination and communication, users security management practices can hinder the benefits that such technologies promise [1]. Studies show that users security management is a problem [2] [3] [4] [5]. Other studies have noted that people tend to delegate computer security responsibilities to technology, trusted individuals or trusted institutions [1] [2]. When an individual
13
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert E. Crossler & Jesus Tanguma
delegates his or her security responsibilities, they somehow believe that their systems security is guaranteed by the trustee (such as a family member or a roommate, even when for instance the roommate moved out). Hence the individual or computer user who has delegated his or her security responsibilities may lack information on the security safeguards that are available and what needs to be done to secure their computer systems. One specific group of users that is of concern in this paper is the Hispanic population. The rapidly growing Hispanic population has formalized a new target audience for marketers. The differences of the demographic distribution of the Hispanic population not only enforce the necessity of localization but also the modification of Hispanic online users. Even with the emerging market of Hispanic consumers, socio-economic factors such as education, income, and language barrier impede Hispanic consumers from the acceptance of online information. Among the Latino population in the United States, Mexicans are the largest national origin group. A U.S. study shows that 52% of Latinos of Mexican origins have a lower probability of online usage. Holding the socio-economic factors, such as age, income, language, generation, and nativity, constant, the Mexican population tends to have lower chances to adopt the Internet [6]. Thus, the understanding of the security behavior of the Hispanic population is useful in the design of software that may be adopted by this particular target. However, there is a lack of research on this population. This study seeks to contribute to the understanding of the security practices of the Hispanic community. Specifically, this paper examines the behavior of undergraduate students in a Hispanic serving institution with respect to how often they update operating systems, nonoperating system software (hereafter referred to as non-OS) and antivirus definitions. We also examine how ethnicity (Hispanic vs. Non-Hispanic), gender, and age influence individuals frequency or likelihood of updating operating systems, non-OS and antivirus definitions. The rest of the paper is organized as follows. We present a related background study of the topic in the next section. Here, we discuss prior related studies and present our research hypotheses. Following, we discuss the research methodology. We then present the results and discussion. Finally, we conclude the paper where we suggest some future research directions.
14
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert E. Crossler & Jesus Tanguma
patches, the more vulnerable the computer is to outside attacks. It is increasingly dangerous when the end users fail to update a patch within days of it being made available [8]. 2.2 Factors That May Influence Security Behavior One of the major demographic variables that may influence security practices is gender. Furnell, Bryant and Phippen [12] conducted research on the awareness of security issues and respondents attitude on the use of safeguard tools of 415 personal internet users in the UK. The findings indicated that male respondents tend to be more confident in considering themselves as advanced in IT experience. Similarly, Dourish and Grinters [1] study noted that age influences users attitude towards security. In this study, we use students from a higher education institution for our study. This is very important especially for the group of users that is the target of this study. Education levels influence Internet usage [13]. Ten percent of Latinos have a college degree, and of that small group, 89% go online. By comparison, 28% of whites have college degrees, and 91% of them use the Internet. Twenty percent of African Americans have college degrees, and 93% report using the Internet [14]. According to previous studies, higher education may lead to higher confidence and the adoption of self-service technology [13]. According to the 2010 United States census data, Hispanics make up the fastest growing ethnic group in the population [15]. Also, Latinos are a young population with approximately twice as large a share of adults under age 40 than that among the white non-Hispanic population. Sixtyseven percent of Latinos age 18-29 go online, whereas 77% of African Americans and 86% whites in the same age range go online [14]. For ages 30-41, 61% of Latinos, 77% African Americans, and 85% whites go online. Fifty-eight percent of Latinos, 69% of African Americans, and 80% of whites age 42-51 use the internet. Finally 46% of Latinos, 49% of African Americans, and 75% of whites age 52-60 go online [14]. Based on the extant literature discussed in this section, we present a set of hypotheses that are tested in this exploratory study (see Table 1). Our dependent variables are frequency of updates of operating systems, non-OS and antivirus definitions whereas the independent variables are Ethnicity (Hispanic vs. Non-Hispanic), Age (< 21 years vs. >= 21 years) and Gender (Male vs. Female).
H1 H2 H3 H4 H5 H6 H7 H8 H9 Non-Hispanics are more likely to update their operating systems software than Hispanics. Non-Hispanics are more likely to update their non-operating system software than Hispanics. Non-Hispanics are more likely to update their antivirus definitions than Hispanics. Males are more likely to update their operating systems than Females. Males are more likely to update their non-operating systems than Females. Males are more likely to update their antivirus software than Females. Students less than 21 years of age are more likely to update their operating systems than those older than 21 years. Students less than 21 years of age are more likely to update their non-operating systems than those older than 21 years. Students less than 21 years of age are more likely are to update their antivirus software than those older than 21 years. TABLE 1: Set of Hypotheses tested in this study.
3. METHODOLOGY
Dourish and Grinter [1] found that users in general had a neutral to negative attitude toward security technologies. Our definition of security practices is based on Dourish and Grinters [1] work where they define security practices as actions, and what practices and patterns people adopt to manage their security needs and accommodate them into their work (p. 393).
15
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert E. Crossler & Jesus Tanguma
Data Collection A survey was conducted to gather information regarding students behavior to security practices. The sample consisted of 315 students taking an entry level Computer Information Systems class in a Hispanic serving university in the South Eastern region of the United States. This study allowed students to have abundant time to answer the survey questions and guaranteed the anonymity of the responses. Students were permitted to opt out anytime during the administration of the survey. There were no identifying questions enclosed in the survey. The survey included demographic questions based on the 2010 United States Census form. This study uses the chi-square statistical test to examine the percentage of students responses that fit into the various categories of the frequency of updates (automatic, weekly, monthly, rarely, never, and I dont know) for the different values of the independent variables. The independent variables are gender, ethnicity, and age.
Male 69.5 16.1 7.6 6.8 18 17.1 65 39.4 24 36.5 15.88 9.959 6.777 Female 70.4 5 7.5 17.1 9.1 10.1 80.8 25.7 24 50.3 Hispanic 70.7 8.7 6.3 14.3 Ethnicity 10.56 2.827 0.285 Non-Hispanic 62.1 13.8 21 3.4 < 21 71 6.7 8 14.3 Age 7.545 0.734 1.026 >=21 66.2 16.9 6.5 10.4 Note: All the numbers are in the unit of percentage except for Chi-Square. Auto = Automatic update, W = Weekly, M = Monthly, N = Never, ? = I don't know, R = Rarely, X2 = Pearson Chi-Square. TABLE 2: Chi-Square Analysis-User Response Percentage Distribution
Prior to discussing the statistically significant differences in our results, it is interesting to note the low overall level of security practices. Operating system updates is the behavior that is most regularly performed automatically. However, this is a setting that is generally set by default and taken care of by the operating system vendor. When it comes to updating non-Operating System software and antivirus definitions there is very poor performance. While this in itself presents useful information for the overall population of interest, we also demonstrate in the following section that there are differences in behavior based on demographic variables.
16
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert E. Crossler & Jesus Tanguma
Hypothesis H1 H2 H3 H4 H5 H6 H7 H8 H9
Pearson ChiSquare
P-Value
Males are more likely to update their operating systems than 15.881 0.001*** Females Males are more likely to update their non-operating systems 9.959 0.007*** than Females Males are more likely to update their antivirus software than 6.777 0.034** Females Non-Hispanics are more likely to update their operating 10.56 0.014*** systems software than Hispanics Non-Hispanics are more likely to update their non-operating 2.827 0.243 system software than Hispanics. Non-Hispanics are more likely to update their antivirus 0.285 0.867 definitions than Hispanics Students less than 21 years of age are more likely to update 7.545 0.056* their operating systems than those older than 21 years Students less than 21 years of age are more likely to update 0.734 0.693 their non-operating systems than those older than 21 years Students less than 21 years of age are more likely are to 1.026 0.599 update their antivirus software than those older than 21 years Note: *** Significance at 0.01, ** Significance at 0.05, * Significance at 0.1 TABLE 3: Results of the Hypotheses tests
Table 3 shows that gender is the only independent variable that significantly influences the frequency of update of all the three dependent variables (operating systems, non-OS and antivirus definitions). The Ethnicity and Age variables only significantly influence the frequency of update of operating systems but not non-OS and antivirus definitions. 4.1 Gender and Frequency of Update of Operating System The calculated Pearson Chi-Square (2 = 15.881, d.f. = 3) and its corresponding p-value (p < .05) for the relationship between frequency of update of operating system and gender indicate that hypothesis 1 is supported at the 5% significance level. Our research shows that males are more likely to update their operating systems frequently than females. While the difference in the number of students who set up their operating system to automatic update is low between males and females (69.5% v. 70.4%), there are differences for the weekly and I dont know" categories. This observation can be explained by Durish and Grinters [1] observation that individual users are likely to rely on a set of guarantees such as technology, family member, friends or institutions and delegate their security responsibilities to the guarantee. As we can see from our data, the female users were more dependent on the guarantee than the males as we see that more males updated their antivirus on a weekly basis. Further, the percentage of those who responded I dont know was far higher for females (17.1%) compared to 6.8% for males. This suggests that females are more likely to exhibit a security behavior whereby once they delegate their security management responsibility do not even worry about what security guards are available on their systems and do nothing to enhance the security of their systems. 4.2 Gender and Frequency of Update of Non-OS Once again our data reveals that males are more likely to update their non-OS than females. Hence hypothesis 2 that states that males would update their non-OS more frequently than females is supported. Although both hypotheses 1 and 2 are supported, there is a sharp distinction concerning gender and frequency of update between operating systems and non-OS. Unlike the operating systems where a great majority of both males and females set their systems to automatic, here a great majority report that they rarely update their non-OS (80.8% females to 65.0% males). Both females and males feel that they are at disadvantage in comparison with hackers and others who can undo all what they could do to protect their security and would rather prefer to delegate their security management practice to a tool or trusted person or institution and not be bothered by the mundane of managing non-operating systems.
17
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert E. Crossler & Jesus Tanguma
4.3 Gender and Frequency of Update of Antivirus Definitions Hypothesis 3 is supported as the Pearson Chi-Square was significant at the 5% level. Specifically, about 39.4% males compared to 25.7% females update their antivirus definitions on a weekly basis. In addition, while 50.3% of females update their antivirus definitions rarely, only 36.5% of males do so. This suggests that males are less likely to delegate their responsibility to update their antivirus definitions to others and take time to frequently update their antivirus definitions in comparison to females. 4.4 Ethnicity and Frequency of Update of Operating System The literature suggests that Non-Hispanics are more likely to have experience with computers than Hispanics. Dourish and Grinter [1] suggest that experience with technology influences users behavior towards security management practice. Thus as we observe from the data, NonHispanics are more likely to update their operating systems more frequently than Hispanics because the former have more experience with technologies such as operating systems. Hence hypothesis 4 is supported. We also observe from our data that Hispanics are more likely to delegate their security management practice to the technology as observed in 70.7% of Hispanics compared to 62.1% setting their operating systems to automatic update. However, more NonHispanics update their operating systems on a weekly basis with higher percentage of Hispanics responding that they do not know whether their operating systems are being updated or not. 4.5 Ethnicity and Frequency of Update of Non-OS The Pearson Chi-Square value (2 = 2.827, d.f. = 2, p = 0.243 > = 0.05) for hypothesis 5 that tests the relationship between ethnicity and frequency of update of non-OS demonstrates that the hypothesis was not supported by our data. A plausible reason for this observation is that most users may have negative attitudes towards non-OS systems in terms of how they may hinder how they use their systems [1]. Similarly, others have observed that users sometimes believe that hackers have more technological skills than they do and that whatever they do to protect their computers against viruses and other attacks, hackers can overdo and so make no effort to work towards protecting the security of their computer systems [1] [5]. Dourish and Grinter [1] also note that users see security as a barrier. They observed from their study that users could not distinguish between security and spam. To the users, security and spam were different aspects of security and so feel that a single technology can address all kinds of problems. Hence they are less interested in addressing issues of non-OS. Thus, users lackadaisical attitudes towards updating non-operating systems may not differ between ethnicities (here Hispanics and NonHispanics). 4.6 Ethnicity and Frequency of Update of Antivirus Definitions Similar to the relationship between ethnicity and frequency of update of antivirus definitions, the relationship between ethnicity and frequency of update of antivirus definition is not significant. Thus, hypothesis 6 is not supported by our data. Once again, users may rely on technology and may not see the importance of worrying about updating antivirus definitions. Dourish and Grinter [1] observe that users may look at an antivirus definition as complete solution to security problems. 4.7 Age and Frequency of Update of Operating Systems Our results reveal that young people (ages < 21) delegate their responsibility to update operating systems to technology than people older than 21 years (71% vs. 66.2%). At the same high percentage of people older than 21 update their operating systems on a more regular weekly basis than those who are younger than 21. The situation is different when it comes to those who report that they never update their operating systems or do not know whether their operating systems are updated or not. The results suggest that those young people who have experience with operating systems would typically set their systems to automatic update while those who may have less experience may not care about the update of the operating systems. However, in general gender influences the frequency of update of operating systems supporting other studies
18
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert E. Crossler & Jesus Tanguma
that suggest that gender influence security practice. Thus hypothesis 7 is supported by our data at the 10% significance level. 4.8 Age and Frequency of Update of Non-OS For the relationship between age and frequency of updating the non-OS, the calculated Pearson Chi-Square value (2 = 0.734, d.f. = 2, p > .05) indicates that hypothesis 8 is not supported by our data. The explanation that was offered for relationship between ethnicity and frequency of update of non-OS may be relevant in this relationship as well. While Dourish and Gritner [1] observe that young people have confidence in what they can do with computer systems, they generally are unhappy with security technologies that hinder their abilities to work efficiently and may therefore choose not to worry about updating non-OS which they may feel would hinder their overall productivity and experience with their computer systems. 4.9 Age and frequency of update of antivirus definition Age was not found to influence the frequency of update of antivirus definitions. Hence our data did not support hypothesis 9. Once again, users irrespective of age would rather delegate responsibility of updates of antivirus definitions or may not be bothered.
5. CONCLUSION
The study examined security management practices of Hispanic college students. Specifically, we examine how ethnicity, gender, and age influence users behavior towards updating their operating systems, non-OS and antivirus definitions. The results reveal that gender influences the frequency of updating operating systems, non-OS and antivirus definitions, whereas ethnicity and age influence only frequency of update of operating systems but not the frequency of update of non-OS and antivirus definitions. In particular, we observe that non-Hispanic students rarely update their systems. Second, male students tend to update their system more frequently. Our research supports other study that demonstrates that male users in a primarily Hispanic institution not only update non-OS more frequently than females, but also update Anti-Virus software more frequently as well [17]. Our results also support prior research that shows that users typically delegate their security management responsibilities to technology, trusted individuals and institutions [1].
19
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert E. Crossler & Jesus Tanguma
7. REFERENCES
[1] P. Dourish, R.E. Grinter, J.D.D.L Flor, and M. Joseph. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal Ubiquitous Computing, vol. 8, pp. 391401, 2004. B. Friedman, D. Hurley, D. Howe, E. Felten, and H. Nissenbaum. Users Conceptions of Web Security: A Comparative Study, Short paper presented at ACM Conf. Human Factors in Computing Systems CHI, Minneapolis, MN, USA, 2002. J. Rimmer, I. Wakeman, L. Sheeran and M.A. Sasse. Examining users repertoire of internet applications, In Sasse and Johnson (eds), Human-Computer Interaction: Proc. of Interact99, 1999. L. Sheeran, M.A. Sasse, J. Rimmer and I. Wakeman. (2002). "How Web browsers shape users understanding of networks." Electronic Library, The. [On-line]. 20(1), pp. 35-42. Available: http://www.emeraldinsight.com/journals.htm?articleid=861950 [Jan. 31, 2011]. D. Weirich and M.A. Sasse. Pretty good persuasion: a first step towards effective password security for the real world, In: Proc. of the ACM new security paradigms workshop (NSPW 2001), Cloudcroft, New Mexico, ACM Press, New York, 2001, pp. 137143. S. Fox and G. Livingston. Latinos Online: Hispanics with Lower Levels of Education and English Proficiency Remain Largely Disconnected from the Internet. Internet: http://www.eric.ed.gov/PDFS/ED495954.pdf, Mar. 14, 2007 [Jan. 22, 2011]. Home network security. United States Computer Emergency Readiness Team. Internet: http://www.us-cert.gov/reading_room/home-network-security/#IV-A-7, Dec. 5, 2001 [Jan. 25, 2011]. J. Antman. Patch Management: An Overview. http://rutgerswork.jasonantman.com/antman-patchManagement.pdf, Dec. [January 21, 2011] 10, Internet: 2008,
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
Updating non-operating system software, Updating non-operating system software to prevent security compromises. Internet: UCSF ITS, University of California, San Francisco: http://security.ucsf.edu/EIS/BestPractices/Staff/StaffUpdatingSoftware.html, 2010 [Jan. 25, 2011] D. Brandl. (2008). DONA forget about security. Control Engineering. 55 (12), pp.14. C. Higby and M. Bailey. Wireless security patch management system, in Proc. of the 5th conference on Information technology education, Salt Lake City, UT, USA: ACM, 2004.
[10] [11]
[12] S.M. Furnell, P. Bryant, and A.D. Phippen. (2007). Assessing the security perceptions of personal Internet users. Computers & Security. [On-line] 26 (5), pp. 410-417. Available: http://www.sciencedirect.com/science/article/B6V8G-4N6NJTT1/2/492a40cf1c60d7fbf02f0bdc01c3f609 [Jan. 25, 2011]. [13] M.L. Meuter, M.J. Bitner, A.L. Ostrom and S.W. Brown. Choosing among alternative service delivery modes: An investigation of customer trial of self-service technologies. Journal of Marketing, vol. 69(2), pp. 61-83, 2005.
[14] S. Fox and G. Livingston.Latinos Online: 2006-2008: Narrowing the Gap. Internet: http://pewhispanic.org/reports/report.php?ReportID=119, Dec. 22, 2009 [Jan. 22, 2011].
20
Yi-Chia Wu, Francis Kofi Andoh-Baidoo, Robert E. Crossler & Jesus Tanguma
[15] K. Humes, N. A. Jones and R.R. Ramirez. Overview of Race and Hispanic Origin: 2010, 2010 Census Briefs. Internet: http://www.census.gov/prod/cen2010/briefs/c2010br-02.pdf, Mar. 2011 [Jan. 22, 2011] [16] E.M. Grieco and R.C. Cassidy. United State Overview of Race and Hispanic Origin: Census 2000 Brief. Internet: http://www.census.gov/prod/2001pubs/cenbr01-1.pdf, Mar., 2001 [Jan. 22, 2011]. R. Crossler, M. A. Villarreal, and F. K. Andoh-Baidoo. A Preliminary Study Examining the Security Practices of Hispanic College Students. SouthWest Decision Science Institute, 2011.
[17]
21
William.figg@dsu.edu
hkam@nemich.edu
Abstract Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the governments attempt to protect patients information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs and application security and transmission protocols are not consistently maintained. Health insurance needs and general financial opportunity has created an emerging market in medical identity theft. Medical offices have the perfect storm of information collection, personal, credit, banking, health, and insurance. Thieves have realized that medical facilities have as much economic value as banks and the security is much easier to crack. Mostly committed by insiders, medical identity theft is a well-hidden information crime. In spite of its covert nature, the catastrophic ramification to the victims is overt. This information crime involves stealing patients records to impersonate the patients in an effort of obtaining health care services or claiming Medicare on the patients behalf. Unlike financial identity theft, there is a lack of recourse for the victims to recover from damages. Medical identity theft undermines the quality of health care information systems and enervates the information security of electronic patient record.
Keywords: Medical Identity Theft, Electronic Patient Record, Information Crime, Information Security
1. INTRODUCTION
Medical offices have in the past focused on the gathering and disseminating information for the efficient treatment of patient maladies. Security was often limited to traditional methods of locking file rooms or file cabinets. The introduction of computers increased the efficiency of medical record keeping but it also increased the security exposure. Computer management of records took information from the hands of a manageable few and created opportunities for leaks, mismanagement and outright theft. Why would anyone be interested in medical information? If the medical facilitys gathering of information is considered the value is easily understood. Records contain personal information including the big three; birthday, social security numberand address. The second portion is financial with the repeat of the previous plus credit and banking information. The last focus is the medical information with the possibility of embarrassment or even blackmail. The advent of electronic patient records has inadvertently created opportunities to health care frauds including medical identity theft. Inaccurate medical records may lead to medical mistreatment that will cause catastrophic consequences to a patient. Literature reviews show the paucity of this research topic. Not many literatures discuss about the crime of medical identity theft and the ramification of data security
22
breaches in health care. Perpetrators treat victims merely as a commodity and they show a complete lack of concern for the damages they did to patients health and to the health care systems [31]. Many assume that medical identity theft is no different from financial identity theft but in fact medical identity theft has more devastating effects on patients for there is a lack of recourse for patient to correct the false entries in their medical records. In reality, false medical information can kill a patient.
23
research conducted by University of Michigan imposes security mechanism to protect sensitive health data. A system called the honest broker is developed to embark upon the issue of health information security. The Honest Broker (HB) is built on the two-component architecture the non-identifiable data is stored in a separate system whereas the identifiable data is stored in another system. HB meditates between these systems and manages data transfer and electronic storage of personal health identifiers [4]. This architecture increases the burden on attackers who need to compromise two systems in order to match the identifiable record with the non-identifiable one. (3) Technology can mitigate the threat of the de-identification of anonymous data and reduce the risks involving the linkability of genomic data such as DNA. A patients location visit pattern, or trail, can be constructed because patients are mobile and their data can be collected and shared by multiple health care organizations. The uniqueness of patients trail can link to a patients record, revealing a patients identity. A formal privacy protection model called kunlinkability is introduced to thwart the trail re-identification and prevent the tracing of DNA records of a patient [22]. This model adopts computational basis and is configured to strip off patients identifiers in a biomedical database.
24
information crime and a health crime that can have medical, financial and other impacts [9]. The victims of medical identity theft can be patients, physicians, and nurses. Strictly speaking, medical identity theft is part of health care fraud, which, according to National Health Care Anti-Fraud Association, is an intentional deception or misrepresentation that the individual or entity makes knowing that the misrepresentation could result in some unauthorized benefit to the individual, or the entity or to some other party[25]. In the context of law, health care fraud is defined as whoever knowingly and willfully executes, or attempts to execute, a scheme or artifice - (1) to defraud any health care benefit program; or (2) to obtain, by means of false or fraudulent pretenses, representations, or promises, any of the money or property owned by, or under the custody or control of, any health care benefit program (Legal Information Institution, Cornell University Law School). Although medical identity theft can fit into the legal definition above, it is best understood in the context of information crime - a very sophisticated crime that involves theft or abuse of identity information and causes financial losses to victims, health care provides, and insurers.
25
for all kind of other services that were provided [31]. The preceding example shows that medical identity theft is committed by insiders and victims are mere a commodity in the eyes of the perpetrators. Other than insiders access to patients records, identity thieves may obtain information by [7]: (1) accessing information based on a legitimate need and then distributing the sensitive information for criminal purposes; (2) hacking into computerized patient information; (3) dumpster driving or collecting information from organizations trash or recyclables; and (4) stealing wallets, purses, or mail from patients, visitors, or staff.
26
This research paper outlines preventive steps after analyzing data in multiple case studies. Currently, literature reviews provide background knowledge on this subject matter. An identity theft literature, Identity Theft and Fraud the Impact on HIM Operations, outlines the practical preventive guidance: Ensure appropriate background checks of employees and business associates who may have access to the patient protected health information. Minimize the use of social security numbers for identifications whenever possible and avoid displaying the entire social security numbers on the computer screens, documents or data collection fields. Store patient protected health information (PHI) in a secure manner by enforcing physical safeguards (e.g.: use restricted areas or locks). Implement and comply with organizational policies for the appropriate disposal, destruction, and reuse of any media used to store and collect patient protected health information (PHI). Train staff on organizational policies and practices to provide protection and appropriate use and disclosure of patient protected health information (PHI) as well as appropriate ways to handle identity theft events. Develop a proactive identity theft response plan or policy that clearly delineates the response process and identifies the organizations obligations to report the crime.
2. Power Relation between Users The exercise of power by health care professions affect the implementation of policy and procedure. Political perspective: the ability of health care professions to affect an outcome and to get things done. 3. Collective Norms, Values, and Knowledge The introduction of new rules and interpretation schemas can be in accordance or in conflict with the pre-existing ones, therefore altering the way people perceive things and thus creating new norms and patterns of practice [18]. The context in which a security policy is formulated and eventually put to practice is characterized by certain rules, norms and interpretation schemes [18]. Reluctance to change working practices in order to make information more secure among health care professionals can be an impediment to the implementation of policy and procedure [15]. 4. Assumptions and Beliefs
27
The organization values shape the underlying assumptions and beliefs that influence the security culture. In regard of medical identity theft, health care professions must be aware of the ethical issues and security practices in health care environment. Many health care professions are unaware of the security threats across the integrated network delivery system that involves multiple third parties. The security awareness will become more important after the implementation of the proposed National Health Information Network (NHIN). The United States Department of Health and Human Services (HHS) envisages that by placing health records online and making health records available everywhere, NHIN will save lives and reduce frauds [9]. However, without proper safeguards and appropriate administration supported by a culture of security, NHIN will run the risk of malicious attack and information theft. In the realm of data security breaches, technology itself is not the culprit but poor enforcement of health care policies due to a lack of security culture is. The result of the research will shed lights on how to coordinate health care policy and procedure with security awareness.
28
subsequently makes the researchers look at the subtle similarities and differences. This enables researchers to break simplistic frame, leading to sophisticated understanding [11]; and (3) case studies can be used for both exploratory and explanatory purposes. For example, the first case study will explore medical identity theft in the natural health care setting. After data collection and data analysis, the second case study will be carried out. The earlier case may produce certain facts in which its significance was only realized after a subsequent case has been completed and the reinterpretation of facts in the subsequent case facilitates the materialization of a more general explanation across all the cases [34]. This will achieve the purpose of exploring and explaining medical identity theft. 2. Operational Framework
The two case studies are conducted in two different health settings Northern Michigan Hospital and Emmet County Health Care Department. Several constructs, as shown in figure 1, are outlined tentatively. The constructs demarcated are based on the findings from literature reviews. The framework above is a logical model that shapes the priorities for exploring in this case study research. Yin [35] postulated that good case studies should contain some operational framework; and having an operational framework prior to the inception of a case study helps to define what is to be studied as well as the topics or questions might have to be covered. The operational framework defined may inadvertently create biases but the framework itself is not a rigid design. Realizing that multiple case studies will unveil different findings, the framework will be modified to reflect the significant findings and discoveries. For instance, more constructs will be added or an existing construct will be better defined. Flexibility and the possibility of discovery have already been taken into consideration. In case study research, flexibility allows researchers take advantage of the uniqueness of a specific case and the emergence of new themes to improve the existing framework and resultant theory [11].
29
1. Interview questions that involve the victims will encompass: The process of identifying medical identity theft The time frame of detecting medical identity theft Steps taken to notify the health care providers Any help offered by the health care providers The repercussion of medical identity theft to the individual
2. The interview questions that health care practitioners or administrators participated are as follows: Approximately how many times did the victim contact the health care providers What are the response given to the victim What steps have been taken by health care administrator to rectify the situation Other than interviews, different data collection methods were utilized, such as questionnaires, documentations, and direct observations. Both qualitative and quantitative data were collected in this case study research. Quantitative data can indicate relationships that may not salient to the researcher whereas qualitative data is useful for understanding the rationale revealed in quantitative data [11]. In summary, the following depicts different data collection methods:
2. Documentations
3. Interviews
4. Direct Observation
The challenge of multiple resources of data collection is that it may be hard to attain convergence information [34]. Given an array of evidence gathered, it is essential to determine whether evidences from different sources converge on a similar set of facts [34]. One of a good way is to investigate. For example, through an informant (health care administrator) most of the health care workers strictly adhere to HIPAA regulations for the purpose of safeguarding personal health information. Through direct observation, the investigator may discover that copies of health care records with Medicaid ID and patients social security number are left unattended and this practice has continued for several days. This will disconfirm the information provided by informant and the convergence information will reveal that health care workers in the health care setting do not take necessary actions to safeguard personal health information.
30
longitudinal reasons. The final case analysis for the first case was written after the second round of data collection. Next, a subsequent case study was carried out Emmet County Health Care Department. The final analysis for each case will be compared and further analyzed. Construct validity can be enforced by sharing the collected data and research findings with the informants and getting feedback from the informants [6]. Although the informants may disagree with the findings, they will point out the incorrect data, if any. The purpose of using sequential design is to allow for reinterpretation with the facts of the earlier case and apply general explanation across all cases [34]. Given that, multiple case studies will serve both exploratory and explanatory purposes. 1. Data Analysis Case studies research will yield a tremendous amount of data. Breaking the data by data source is a good way to handle a staggering amount of data. For instance, data collected from interviews and data collected from questionnaires independently was reviewed independently. This is to separate the qualitative data analysis from quantitative data analysis. It is important to keep in mind that qualitative data provides insights about the underlying issue of medical identity theft in a dynamic environment. There is anticipation that new variables will emerge as a result of serendipitous changes in the dynamic environment. The predefined constructs may have to iterate between constructs and case data to redefine the operational framework that serves as guideline in this case study.
19. RESULT/CONCLUSION
Attitude and perception of employees towards security has been discovered through the results of questionnaire. Descriptive statistic will be applied in data analysis of the questionnaire to give us a clue pertaining to security awareness in health care organization. This piece of information will then be integrated with qualitative data that will provide us the insight of prevention and detection of medical identity theft. The qualitative data will embody data collected from interviews, documentations (e.g. health care records), and notes taken from direct observation. In summary, the following table depicts research results: 1. Questionnaire Descriptive statistic will yield result that will shed light on the security culture of a health care organization. Data collected from interviews will produce result regarding the insights of medical identity theft, including how it occurred, the way health provider handled this issue, and the negative ramification on the victims. Documentation will include meeting minutes, medical forms, billing forms, and health record. The result will provide insights about organization structure and the operation issue within a health care organization.
2. Interview
3. Documentation
4. Direct Observation The result of direct observation will be able to capture part of the organization culture and attitude towards security. The results from every type of data collection will be integrated to shape a holistic view of medical identity theft. In specific, the incident of medical identity theft can be viewed from organizational, operational, technology, and human resource perspectives [12]. This holistic view will facilitate proper suggestions of health care policies and procedures and build theories regarding medical identity theft. Most likely, multiple theories will be derived from multiple case studies. These theories will involve several variables including detection and prevention of medical identity theft, health care policies and procedure, security culture, and technology application. Cross case analysis will point to contradicting facts. There is strong evidence indicating a lack of security culture in one case study and strong security culture in another.Thisoccurrence caused addition of technology as a new construct in the operation framework, inferring that technology plays a role in fighting medical identity theft.
31
A juxtaposition of multiple case studies will reveal subtle similarities and differences. For example, both case studies show that the incidents of medical identity theft were committed by medical billing specialists. The victim in a case study discovered the crime through inaccurate billing whereas the victim in another case study discovered the crime through inaccurate medical data that was unveiled when the victim was admitted to the hospital for surgery. The difference may infer that the perpetrator in the later case study was much more sophisticated than that of the former case. Pro-active detection of medical identity theft, in this regard, will encompass reviewing both medical billing record and patients medical data [4]. Macroscopically, the resultant theories from these case studies will suggest proactive detection and prevention of medical identity theft and recommend sound policies and procedures to mitigate the risks of security breaches in health care information systems. This will also provide suggestion to reduce security risk in the proposed National Healthcare Information Network (NHIN).
REFERENCES
1. Appelbaum, P.S., Threats to the Confidentiality of Medical Records No Place to Hide, JAMA; (283:6), pp. 795-797, Feb 2000. 2. Benbasat I., Goldstein D.K., and Mead M.,The Case Research Strategy in Studies of Information Systems, MIS Quarterly; (11:3), pp. 369-386, Sept. 1987 3. Biotech Business Week, Electronic Medical Records: Medical Identity Theft Survey Shows Consumers Concerned about Privacy, Protection of Records, Jan 8, 2007. 4. Boyd, A.D., Hosner, C., Hunscher, D.A., Athey, B.D., Clauw, D.J., and Green L.A., An Honest Broker mechanism to Maintain Privacy for Patient Care and Academic Medical Research, International Journal of Medical Informatics; (76); pp. 407-411, 2007,. 5. Conn, J., "A Real Steal. Patients, Providers Face Big Liabilities as Medical Identity Theft Continues to Rise, and in Many Cases it's an Inside Job,"Mod Healthc; (36), pp. 26-28, 2006. 6. Cooper, R. B., Information Technology Development Creativity: A Case Study of Attempted Radical Change, MIS Quarterly; (24:2), pp. 245-276, Jun. 2000,. 7. Davis, N., Leniery, C., and Roberts K.,Identity Theft and Fraud The Impact on HIM Operations, Journal of AHIMA; (76:4); April 2005. 8. Davenport, K.A.,Identity Theft that can Kill www.law.uh.edu/healthlaw/perspectives/2006/(KD)IdentityTheft.pdf you, Available at
9. Dixon, P., Medical Identity Theft: the Information Crime that can Kill You, The World Privacy Forum; May 2006. 10. Earp, B.E. and Payton, F.C.,Information Privacy in the Service Sector: An Exploratory Study of Health Care and Banking Professional, Journal of Organizational Computing and Electronic Commerce; (16:2), pp. 105-122, 2006.
32
11. Eisenhardt, K.M., Building Theory from Case Study Research, Academy of Management. The Academy of Management Review; (14:4), Oct 1989; ABI/INFORM Global. 12. Emam, K. E., Neri, E., and Jonker E., An Evaluation of Personal Health Informations Remnants in Second-Hand Personal Computer Disk Drives, Journal of Medical Internet Research; (9:3); 2007. 13. Fromer, M.J.,(2007) Medical Identity Theft: Under-reported, Underresearched, & More Common than Generally Known, Available atwww.oncology-times.com; Jan 5, 2007. 14. Garson, K. and Adams C., Security and Privacy System Architecture for an e-Hospital Environment, ACM International Conference Proceeding Series; (283pp. 122- 130, ); 2008. 15. Gaunt, N., Practical Approaches to Creating a Security Culture, International Journal of Medical Informatics; (60); pp. 151 157, 2000. 16. Gostin, L.O., Personal Privacy in the Health Care System: Employer-Sponsored Insurance, Managed Care, and Integrated Delivery Systems, Kennedy Institute of Ethics Journal, (7:4), pp. 361 376, 1997. 17. Hutson, T., Security Issues for Implementation of E-Medical Records, Communication of ACM; (44:9), Sept. 2001. 18. Karyda, M., Kiountuzis, E., and Kokolakis, S., Information Systems Security Policies: A Contextual Perspective, Computer & Security; (24); pp. 246-260, 2005. 19. Kluge, E. W., Fostering a Security Culture: A Model Code of Ethics for Health Information Professionals, International Journal of Medical Informatics; (49); pp. 105 110, 1998. 20. Lee, A. S., A Scientific Methodology for MIS Case Studies, MIS Quarterly; (13:1), pp. 33-50 , March 1989. 21. Lindberg, D.A.B. and Humphreys, B.L., The High-Performance of Computing and Communications Program, the National Information Infrastructure, and Health Care, Journal of the American Medical Informatics Association; (2:3), pp. 156-159, May-Jun. 1995. 22. Malin, B., A Computational Model to Protect Patient Data from Location-Based Re-Identification, Artificial Intelligence in Medicine; (40:3); pp. 223-229, Jun. 2007. 23. Merisalo, L.J., Medical Identity Theft, Aspen Publishers; (17:9); June 2008. 24. McMurray, A.J., Gilbert, C.A., Reis, B.Y., Chueh, H.C., Kohane, I.S., and Mandl, K.D., A SelfScaling, Distributed Information Architecture for Public Health, Research, and Clinical Case, Journal of American Medical Informatics Association, (14); July Aug. 2007. 25. Offen, M.L., Health Care Fraud, Neurologic Clinics, (17:2); May 1999. 26. Pear, R. (2008)Agency Sees Theft Risk For ID Card In Medicare, Available at
www.nytimes.com/2008/06/22/washington/22medicare.html
27. Roger France, F.H., Control and Use of Health Information: a Doctors Perspective, International Journal of Bio-Medical Computing, (43); pp. 19-25, 1996.
33
28. Schlienger, T. and Teufel, S., Analyzing Information Security Culture: Increased Trust by an Appropriate Information Security Culture, Proceedings of the 14th International Workshop on Database and Expert Systems Applications; 2003; IEEE. 29. Sloane E.B., Using Standards to Automate Electronic Health Records (EHRs) and to Create Integrated Healthcare Enterprises, Proceedings of the 29th Annual International Conference of the IEEE EMBS, Aug. 2007. 30. Smith, E., and Eloff J.H.P., Security in Health Care Information Systems Current Trends, International Journal of Medical Informatics, (54); pp. 39-54, 1999. 31. Sparrow, M. K., License to Steal. How Fraud Bleeds Americas Health Care System, Westview Press; 2000. ISBN: 0-8133-6810-3. 32. Vacca, J.R., Computer Forensics: Computer Crime Scene Investigation, Second Edition, Charles River Media; 2005. ISBN: 1-58450-389-0. 33. Yin, R. K., Enhancing the Quality of Case Studies in Health Services Research, Health Services Research (34:5), pp. 1209-1224, Dec. 1999. 34. Yin, R. K., The Case Study as a Serious Research Strategy, Science Communication; (97:3), 1981. 35. Yin, R.K., Case Study Research: Design and Methods, (2nd ed.), Sage, Newbury Park, CA, 1994.
34
An Enhancement of Authentication Protocol and Key Agreement (AKA) For 3G Mobile Networks
Mustafa AL-Fayoumi
Faculty of Engineering and Sciences Al-Kharj University Riyadh, 11942, Saudi Arabia
fayoumi6@yahoo.com
Jaafer AL-Saraireh
Information System Applied Science University Amman, 11931, Jordan
sarjaafer@yahoo.com
Abstract This paper proposes a secure authentication mechanism by integrating the public key with the hash-chaining technique. The propose protocol satisfies the security requirements of third generation (3G) mobile networks. Also provide the protection of the international mobile subscriber identity (IMSI) to ensure subscriber un-traceability, key refreshment periodically, strong key management and a new non-repudiation service in a simple and elegant way. The proposed protocol is more secure protocol than the other available authentication protocols. To avoid the complicated synchronization as in universal mobile telecommunications system (UMTS) the proposed protocol does not use sequence number (SEQ), the management of a hash chain is simple and elegant compared to that of SEQ. This proposed protocol is secure against network attacks, such as replay attacks, guessing attacks, and other attacks. Keywords: Mobile Security, 3G, AKA, public-key, cryptography.
1. INTRODUCTION
In order to provide security services in wireless networks, authentication is used as an initial process to authorize a mobile terminal for communication through secret credentials [1] [2]. In authentication process, a mobile terminal is required to submit secret materials such as certificate or challenge and response values for verification. Without strong authentication, mobile networks access is unprotected through the release of message contents, modification of message or denial of service can be accomplished easily by an intruder. There are three entities participating in the UMTS security architecture, home environment (HE), serving network (SN) and mobile station (MS). Figure 1 illustrates the UMTS architecture. The HE contains the home location register (HLR) and authentication centre (AuC). The SN consists of the visited location register (VLR) and the Serving GPRS Support Node (SGSN). The VLR handles circuit switched traffic, but the SGSN handles the packet switched traffic [3]. Authentication procedure is executed when the MS moves from one registration area (RA) to another one (location update) during the process of calls origination and call termination. The MS is continuously listening to the broadcast message from VLR/SGSN to identify the location area by using location area identity (LAI) and the MS compares the LAI which is received with the LAI that stored in the universal subscriber identity module (USIM). When the LAI is different than the MS executes authentication procedure [2]. An authentication mechanism is a process designed to allow all participants show their legality and verify the other participants identities that involved in the networks. This mechanism using secret key K, and cryptographic algorithms - include three message authentication codes f1,
35
f1*and f2 and four key generation functions f3, f4, f5 and f5*- [3] [4] [5] that are shared between MS and the HLR/AuC. This is known as authentication and key agreement protocol (AKA). The AuC maintains a counter called sequence number (SQNHLR), where user MS maintains a counter (SQNMS), whose initial value for these counters are set to zeros [4] [5].
HLR AuC
VLR/ SGSN
MSC MSC
VLR/ SGSN
There are three goals for the UMTS AKA [4]: a mutual authentication between the user and the network; an establishment of a cipher key and an integrity key upon successful authentication; and a freshness assurance to the user of the established cipher and integrity keys. There are two phases in AKA protocol [4] [3] i. MS registers with its HLR/AuC and then generates and distributes authentication vectors from the HLR/AuC to the VLR/SGSN. ii. The authentication and key agreement procedure between the MS and the VLR. Figure 2 describes authentication mechanism as follow: 1. When the MS moves to new VLR/SGSN area then MS sends (IMSI) authentication request to VLR/SGSN. 2. VLR passes this authentication request to HLR. 3. HLR generates authentication vectors AV(1..n) and sends authentication data response AV(1..n) to VLR/SGSN, where each authentication vector is called a quintet This AV consists of five components: random number (RAND), expected response (XRES), cipher key (CK), integrity key (IK) and authentication token (AUTN). The authentication vectors are ordered by the sequence number SQNHLR. The authentication vector is generated according to the following sequence: i. HLR/AuC generates SQNHLR and RAND. ii. HLR/AuC computes XRES = f2(K,RAND), CK = f3(K,RAND), IK = f4(K,RAND), Anonymity Key AK = f5(K,RAND), Message Authentication Code MAC = f1(K,SQN||RAND||MAF), where MAF is Message Authentication Field and AUTN = (SQN AK||AMF||MAC) where is exclusive OR operation. iii. HLR/AuC SQNHLR is increased by 1. th 4. VLR stores authentication vectors. In the i authentication and key agreement procedure, th VLR/SGSN selects the i authentication vector AV(i), and sends (RAND (i), AUTN(i)) to MS. In the VLR one authentication vector is needed for each authentication instance. This means that the signalling between VLR and HLR/AuC is not needed for every authentication events. 5. MS computes and retrieves the following:
36
Anonymity key AK = F5 (Rand, K), SQN =( (SQN AK) AK), computes expected message authentication code XMAC = f1 (SQN, RAND, AMF) and then, ii. Compares XMAC with MAC which is included in AUTN. If XMAC is not equal to MAC then MS sends failure message to the VLR/SGSN, else if XMAC is equal MAC then MS checks that the received SQN is in the correct range i.e. SQN > SQNMS. If SQN is not in the correct range then MS sends failure message to the VLR/SGSN, else if it is in the correct range, then MS computes the Response RES = f2 (K, RAND), and CK = f3 (K, Rand), iii. After that, it sends RES to VLR/SGSN. 6. VLR compares the received RES with XRES. If they match, then authentication is successfully completed. 7. i.
MS VLR/SGSN HE/HLR
This paper is organized as follows. Section 2, the literature review and related works is presented. In Section 3, the framework for the proposed protocol is described. The operation modes for the proposed protocol are described in Section 4. The description of initial and subsequent authentication for the proposed protocol is presented in Section 5. The security analysis for the proposed protocol is presented in Section 6. In Section 7, a comparison with UMTS AKA protocol and related works is carried out. The paper is concluded in Section 8.
2. RELATED WORKS
Several authentication schemes have been proposed for mobile networks to enhance the security of mobile communication systems. However, these schemes cannot fulfill the security requirements of 3G mobile systems [6]. Specifically, the schemes proposed by [7] [8] [9] [10] [11] [12] [13] [14] and [15] were not designed based on 3G mobile systems and incur much computational overheads. The authentication techniques for 3G mobile networks are presented by [8] [16] [17]; but these techniques did not address other security issues, such as end to end security, anonymity and confidentiality issues. The International Telecommunication Union (ITU) proposed three authentication techniques for International Mobile Telecommunications-2000 (IMT-2000), which is the global standard for 3G. These techniques only provide some security features and have some weaknesses. The first technique is based on the use of symmetric key cryptosystems and a challenge-response exchange. This technique requires too many authentication messages and does not ensure end to end security. Also, assuming the connection between the network operator and service provider is secure; the messages that are transmitted through the connection are vulnerable. The second authentication technique is based on the unilateral use of a digital signature scheme and a challenge-response exchange. This technique did not provide mutual authentication or end to end security and created high computation costs. The third technique is also based on the use of a digital signature scheme. The public key certificates and timestamps are combined to provide user identity confidentiality and unilateral entity authentication in a single mechanism. The third technique is the same as the second technique; but did not provide mutual authentication, end to end security and created high computation costs. In all of these techniques the authentication
37
technique is fixed, such as that the network operators of visited domains must be involved in the authentication procedure between roaming users and home service providers. This represented a common weakness in the three techniques. An end to end authenticated session key exchange protocol based on the certificate over several distinct networks is presented by [18]. This protocol is not built upon a certain public key system, but the protocol can be built upon Modular Square Root (MSR) or RSA. The proposed protocol has some disadvantages, such as the public key systems (MSR and RSA) require large storage and bandwidth requirement during the execution, and the user identifications are stored in certificates and these certificates are exchanged between the users and the network in the plain text, and thus user identity confidentiality is not provided. Asymmetric cryptography in UMTS networks is proposed by [19]. This method consists of the introduction of public-private key pairs for the transactions between the VLR and HLR, as well as the MS and VLR. The information exchanged between the VLR and the HLR is based on the good trust link between these nodes. However, according to specifications that define GSM, GPRS and UMTS, there is no mutual authentication between the VLR and HLR, and no data encryption takes place when these two nodes communicate. The HLR consider that the VLR is a trusted partner, and based on this consideration it delivers information to the VLR, and the VLR delivers information to the HLR. The link between the VLR and HLR is exposed to any kind of attack (e.g. masquerading, data distortion, etc.). Using public keys in the authentication process in mobile networks was abandoned because of backwards compatibility with GSM and for the performance consideration [20] [21] [22]. UMTS AKA has some problems, including bandwidth consumption between a serving network and a users home network, space overhead of the serving network. Huang and Li propose an extension of UMTS AKA protocol, called UMTS X-AKA, to overcome the above mentioned problems of UMTS AKA [23]. Zhang and Fang, Zhang and Fujise , and Zhang showed that the 3GPP AKA protocol is vulnerable to a variant of the false base station attack [4] [24] [25] [26]. The vulnerability allows an adversary to redirect user traffic from one network to another. It also allows an adversary to use authentication vectors corrupted from one network to impersonate all other networks. Zhang and Fang presented a new authentication and key agreement protocol, which overcomes redirection attack and drastically lowers the impact of network corruption. The protocol, called adaptive protocol AKA (AP-AKA), also eliminates the need of synchronization between a mobile station and its home network [4]. A new technique for public key image authentication using fussy computations for El-Gamal authentication technique is proposed by [27]. A mutual authentication key and key exchange protocol suitable for application is proposed by [28]. This protocol named F-MAKEP. The FMAKEP scheme integrated into Wireless Transport Layer Security (WTSL) framework; the security was enhanced while more computation overhead was incurred. The UMTS AKA protocol has the problem of the bandwidth consumption between SN and HN. It is attractive to choose a suitable length (L) value for AV in the third generation mobile networks. So, many techniques are developed to minimize the authentication signalling cost and network bandwidth with consumption by selecting the dynamic length (L) for an authentication vector. Yet with this improvement, Lin and Chen (and AL-Saraireh and Yousef, are still there are bandwidth consumption [3][29]. The technique of Lin and Chen [29] basically estimates the number of authentication requests in current visited network based on the number in the previous visited network. Whereas the method of AL-Saraireh and Yousef [3], estimates the number of authentication requests in current visited network based on the history of mobile movements and the arrival rate for events.
38
f n1 (M ), f n2 (M ),K, f ( f ( f (M ))), f ( f (M )), f (M ) and the server stores those. The user holds f n (M ),K, f ( f ( f (M ))), f ( f (M )) .
39
After the registration is completed, each hash chain can be used by the claimant to prove itself to ih n-1 the server N times. In the j session, the user provides f (M) to ask for a connection to prove n-1 itself. The server can verify the correctness of f (M) by means of the one way function by computing f(f n-1(M)) and the server needs to store f n-1(M) as the last value of user to authenticate the next visit. So, the user reveals fn-1(M), fn-2(M),,f(M), and M=f 0(M) in sequence to prove itself n times. In this way f n-j (M) can be used as a proof of the jih connection. In the proposed protocol the dynamic concept achieved through management the dynamic keys between the MS HLR/AuC and MS SGSN/VLR. In other words the dynamic mechanism works at two levels by the keys refreshment are used whether at MS/HLR and MS/VLR for each Initial and subsequent authentication session respectively. Moreover, this property provides service providers with the ability to develop proprietary authentication mechanisms and adjust the keys in run time. Where in the dynamic key agreement the HLR/AuC is determine number of subsequent authentication procedure that will be executed for each time the initial authentication procedure starts which will discusses in the following section. When MS makes a service contract with his/her home network HLR generates the public and private keys and subscribes public key to MS and keeps it in its database and save KHU, IMSI and CertM in the SIM/USIM of MS. In the initial authentication procedure the MS encrypt an Authentication Request Message between MS to HLR (AUTHMH ) by HLR's public key that has been saved in the SIM. HLR decrypt it by its private key, and then refresh the new public key and send back to MS within Authentication Data Response Message between HLR to MS (RAUTHMH) to use it in the second time. Consequently, Dynamic key management is achieved at the level of MS and HLR/AuC. Meanwhile, the MS generates a session key KVM = f (KVM, IK CK) as a shared key between MS and SGSN/VLR, where IK and CK are a nonce numbers and f n(M) where f n(M) is a one-way hash chaining function and n represents the maximum number of services that the MS can request after initial authentication, then send it within AUTHMH to SGSN/VLR through HLR. The VLR save KVM, CK and f n(M) under the ID of that user and sends Authentication Data Response Message between VLR to MS (RAUTHMV ) encrypted by the session key KVM of its response message. In the subsequent authentication procedure the MS generates a new session key KVM = f (KVM, IK CK), where IK is a new generated nonce and KVM is the shared key. CK is in the messages sent by the MS to the VLR in the initial authentication procedure. Meanwhile, the MS produces f ni (M), where ( i) is the number of services that have been requested, and M is the secret key generated in the initial authentication. VLR generates a new session key KVM using the same function used by the MS and then encrypts RSAUTHUV = (IK+1 TMSI) with KVM, and then sent is sent back to the MS. After that upon receipt of the response message, the MS decrypts the RSAUTHUV using KVM. The subsequent authentication procedure only contains two message exchanges. The nonce number IK transmitted between the MS and VLR is used to refresh the session key. In this way, the encryption key used for every session is different. Except for the first session key, key generation is performed by both the MS and VLR. The first session key is generated by the MS and sent to the VLR. After that, the VLR can generate the following session key by itself. By using KVM and IK CK as two inputs, the MS and VLR can generate the same new session key if the inputs are identical. Consequently, Dynamic key management is achieved at the level of MS and SGSN/VLR. Therefore, using the refreshment keys concept in both MS, SGSN/VLR and HLR/AuC according to the n and t value which has determined by MS and HLR/AuC respectively, the subscribed
40
service period (t) is used to determine whether the service request is out-of-date or not, and (n) is used to determine the number of times and the ith session to perform the subsequent authentication procedure dynamically, without transfer any clear parameters. In the i-th session, the user provides n-i (M) to ask for a connection to proof of the i-th connection. Consequently, Dynamic key management is achieved at the level of MS and SGSN/VLR.
4. OPERATION MODES
In this proposed protocol, VLR/SGSN in SN maintains the profiles and privileges of the registered MS. Thus, only the MS's home network (HLR) can initially authenticate the MS. Another entity, the VLR/SGSN in SN, is responsible for forwarding the MS's authentication request to the HLR in HN. In the proposed protocol, after initial authentication has been performed, the VLR/SGSN in SN is then capable of authenticating the MS when it is required. The proposed authentication protocol contains two operation modes for initial and subsequent authentication. i. Registration and Distribution of Authentication Information (Initial Authentication): This procedure is used when a mobile user (MS) leaves his home domain and roams to a visited domain. The user may request services from the network operator of the visited domain. In this case, the initial authentication shown in Figure 3 is performed between the three parties. First, the request message is generated by the MS and sent to the authentication VLR/SN in the visited domain. Since the VLR/SN is unable to authenticate the MS by itself, it forwards it to the HLR in MSs home domain. The verification procedure is performed by the HLR. A response message is generated corresponding to the authentication result as authentication vector (AV). The VLR/SN forwards the response message to the MS and decides whether or not to provide the service to the MS according to the authentication result. Here, the VLR/SN caches some authentication information, which can be used in subsequent authentication. The response message lets the MS know whether the authentication was successful or not. After the initial authentication, both the VLR/SN and MS obtain the authentication result from the HLR/HN and share some secret information without intervention of HLR/HN.
ii. Authentication and Key Agreement (Subsequent Authentication): After initial authentication, the VLR/SGSN has the ability to authenticate the MS in subsequent communication. If the MS remains in the same visited domain and requests services, then the user should ask for subsequent authentication. MS similarly generates an authentication request message, which should contain the information shared between the MS and VLR/SN; the VLR/SN then uses this information to authenticate the MS. As mentioned above, the VLR/SN has cached information needed to authenticate MS. After authenticating the MS, the VLR/SSN sends a response message containing the authentication result to the MS. The MS receives the response message and learns whether the authentication was successful or not.
41
5.1 Initial Authentication Procedure To mitigate the computation burden of mobile equipment, the encryption is clone in MS side since the public key operation takes (K2) complexity but private key operation takes (K3) complexity with the typical modular exponentiation algorithms used to implement the RSA algorithm, where K is the number of bits in the modulus. Table 1 gives the software speeds of RSA [34]. RSA goes much faster if we choose a value of e carefully. Therefore, we suggest the exponent value e should be smaller. In order to make use of public key cryptography on the lowcomputation mobile equipment, the related research can be found in [35]. RSA Speeds for Different Modulus Lengths with an 8-bits Public Key(on a SPARC )
512 bits
Encrypt Decrypt Sign Verify 0.03 sec 0.16 sec 0.16 sec 0.02 sec
768 bits
0.05 sec 0.48 sec 0.52 sec 0.07 sec
1,024 bits
0.08 sec 0.93 sec 0.97 sec 0.08 sec
In 2003, RSA Laboratories recommends the minimum key length for general data is 1024 bits without any specifying lifetime [36]. NIST recently recommends 1024 bits for RSA, which is taking into account the lifetime of the data. For security concerns and the execution speeds of the public key encryption, we suggest the value of public key length is optimally 1024 bits. Before we describe the common registration phase of the proposed mechanism, we assume the following operations are performed when MS makes a service contract with his/her home network HLR: HLR generates the Public and Private Keys. HLR subscribes (Public Keys) to MS. HLR produces a certificate CertM to (Public Keys) and keeps it in its database. HLR writes KHU, IMSI and CertM in the SIM/USIM of MS. At first, the scheme consists of four messages exchanged between the MS, VLR and HLR. The message flows are indicated in Figure 3. The notations are defined as follows: IMSI TMSI KHU, KHP KVU, KVP KHU KVM KVM IK, CK T () AUTHMH AUTHVH RAUTHMH RAUTHMV NOMENCLATURE International Mobile Subscriber Identity Temporary Mobile Subscriber Identity generated by HLR/AuC Public/private key pair of HLR Public/private key pair of SGSN/VLR The new HLRs public key Session key shared by the MS and SGSN/VLR (IK, CK): session key between the MS and VLR, the function may be a simple function. e.g. the XOR of IK and CK. h (KVM, IK CK) Nonce numbers Subscribed Service Period A one way Hash function; Authentication Request Message between MS to HLR n IDM, IDH, EKHU ( IMSI IK CK KVM (M)nIDV) Authentication Request Message between VLR to HLR IDV, EKVP (IDV, RV) Authentication Data Response Message between HLR to MS EKHP (IDH IK+1 TMSI T KHU' KVU ) Authentication Data Response Message between VLR to MS EKVP (EKVM (IK+1), TMSI ))
42
Authentication Data Response Message between HLR to VLR EKVU (RV IK CK KVM n (M)n T TMSI) The identity of the MS Identity of VLR Identity of HLR Logical computation, bit-wise exclusive or operation
To exercise the proposed protocol, this section describes how that can be applied to enhance the authentication procedure. It is known that the authentication process is achieved by all the authentication entities of 3G mobile network. The proposed authentication protocol is divided into two procedures; the first one is named Initial authentication procedure, which flow from MS VLR HLR. The second one is limited between MS VLR is the Subsequent authentication procedure. In the proposed authentication protocol, we assume that MS HLR/AuC and SGSN/VLR HLR/AuC have the public/private key pair and use Public-Key cryptosystems. In addition, there is public key infrastructure so that public keys can be correctly and efficiently distributed. This enables all entities of network (3G) to mutually authenticate each other easily. MS can obtain the public key of the VLR to be sent by the HLR. At first, the MS sends secret message to challenge the VLR and HLR, and the VLR also sends secret message to challenge the HLR. However these secret messages are encrypted with its public and private key respectively. After that the VLR and HLR send a message to response the MS that decrypt by its private key. The HLR also decrypts the secret messages to response the VLR based on VLRs public key. If the processes are finished, they can achieve mutual authentication between all participants, and refresh the HLRs public key.
MS SGSN/VLR HLR/AuC
IDM, IDH, EKHU(IMSI IK CK KVM f n(M) n ID ) IDM, IDH, EKHU(IMSI IK CK KVM f n(M) n IDn)
Step 1: M1 Authentication Request Message When an MS needs to authenticate itself to all entities of network to access or utilize of network services, The MS invokes the distribution of authentication procedure by sending the Authentication Request messages to the HLR/AuC (AUTHMH) through VLR. Authentication
43
between the MS and his HLR/AuC relies on the use of its public key KHU. This process is achieved as follows: The MS generates the following: 1. The Nonce Numbers IK, CK 2. The Session Key KVM 3. M is secret information n n 4. (M) where (M) is a one-way hash function and n represents the maximum number of services that the MS can request after initial authentication. Here n ( ) = (n-1 ( )), 1( ) = ( ). The MS sends AUTHHM to VLR: n AUTHMH= IDM,IDH,EKHU(IMSI IKCKKVMf (M) nIDn), where IDM is the identification of the MS that HLR can verify his signature. Step 2: M2 Authentication Request Message When the VLR receives the message from the MS, it passes the message to the HLR, and sends the AUTHVH of its challenge message to the HLR. However, the (IDV RV) KVP is encrypted by its private key. After receiving these messages, the HLR decrypts by their corresponding private and public key them access the database to obtain the CertM and CertV, respectively. IDV, EKVP (IDV, RV) Step 3: M3 Authentication data Response Message The HLR sends RAUTHHM encrypted by HLR's private key and RAUTHHV encrypted by VLRs public key of its response messages to the VLR, respectively. After receiving these messages, the VLR decrypts RAUTHHV by his secret key to get RV, TMSI, IK, CK, KVM, n (M), n and T. Then, the VLR saves n(M), n, and CK for subsequent authentication and session key generation. RAUTHHM = EKHP (IDH IK+1 TMSI T KHU' KVU ) Step 4: M4 Authentication Response Message The SGSN/VLR sends RAUTHHM encrypted by HLRs private key and RAUTHVM encrypted by VLRs private key of its response to the MS. After receiving these messages, the MS decrypt RAUTHHM by HLR's public key to get KVU, KHU, IK+1, TMSI and IDH. After getting KHU, it knows that key refreshment is successfully. Filially, it gets KVU that has sent from HLR to decrypt RAUTHVM to obtain EKVM (IK+1), TMSI and then encrypt EKVM (IK+1) to get IK, then MS verifies the value of (IK + 1) if it is correct, then the authentication is successful, and the MS gets new temporary identities, TMSI. Also, KVM becomes the shared key used by the MS and SGSN/VLR, the authentication process is finished. RAUTHHM = EKHP (IDH IK+1 TMSI T KHU' KVU ) RAUTHVM = EKVP (EKVM (IK+1), TMSI )) 5.2 Subsequent Authentication Procedure After the initial authentication, SGSN/VLR gets a secret key KVM that it shares with the MS and subsequently can accomplish the authentication by itself. That is, subsequent authentication only happens between the MS and SGSN/VLR using two message exchanges. Figure 3.2 exhibits the subsequent authentication procedure, and the authentication steps are described as follows.
44
MS
SGSN/VLR
HLR/AuC
TMSI
The notations in Figure 2 are defined as follows: SAUTHMV : TMSI, EKVM (IK, n-1 (M)) SRAUTHVM : EKVM' (IK+1, TMSI)
Step 1: The MS generates a new session key KVM = h (KVM, IK CK), where IK is a new generated nonce and KVM is the shared key. CK is in the messages sent by the MS to the VLR in the initial authentication procedure. Meanwhile, the MS produces n-i(M), where i is the number of services that have been requested, and M is the secret key generated in the initial authentication. The MS sends SAUTHMV that encrypted the session key KVM to the VLR, which contain IK, n-i(M). SAUTHUV : TMSI, EKVM (IK, n-1 (M)) Step 2: SGSN/VLR first checks the subscribed service period of the mobile user for the requested service. If the service request is not made within the valid subscribed service period, the service request is rejected. The procedure then restarts from step 1.1. Else SGSN/VLR decrypt SAUTHMV by the shared session key KVM and compares the result with IK. Moreover, SGSN/VLR computes (n-i(M)) to verify whether it is the same as the number, n-i+1(M), which SGSN/VLR saved in the last authentication. If they are identical, the MS has been authenticated successfully. SGSN/VLR send RSAUTHMV = (IK+1 TMSI) encrypted by the new session key KVM, which was generated using the same function that used by the MS. Upon the MS receipt of the response message, the MS decrypts the authenticator using KVM. TMSI) SRAUTHUV : EKVM' (IK+1,
6. SECURITY ANALYSIS
In accordance with the proposed scheme, it is assumed that a VLR has powerful computation ability and has no worry about power supply, which means it can handle more complex calculations. Since we consider the low computation ability and low power of mobile equipments, we make the RSA encryption be clone in MS side. Table 3.1 indicates that the RSA encryption provides far superior performance than decryption. Furthermore, the session key KVM is generated by MS. The VLR will use the key to verify the MS again when he/she requires a service, e.g. making a call etc. We assume that the authentication key is generated through a secure random number generator and kept securely for each related parties. Based on the recommendation of RSA Laboratories and NIST, the public key length that we use is 1024 bits. For NIST, 1024 bits public key length is appropriate for protecting data through the year 2015, which means it can hardly be broken using todays computer technology. Since the security of public-key cryptography depends on the key length and assumes that factoring this large numbers is very hard. From the previous suggestion, we assume the public key pair (e, n) of VLR is secure, and the private key d is safe and known only by VLR.
45
Furthermore, the KHP is supposed to be kept secretly by HLR. Base on these hypothesis, we make the following security analysis to prove that our modification is robust and against to replaying, guessing and substitution attacks. Note that the analysis is based on the UMTS. In this section, we will discuss the security of the proposed protocol. In order to ensure that the proposed protocol is secure, we will analyze and discuss the attack methods. The security requirements of third generation mobile systems are mutual authentication, MS anonymity, endto-end security, non-repudiation, and data integrity and data confidentiality. The proposed scheme can fulfill all of these requirements. First, consider the authentication requirement. It is clear that the proposed authentication protocol can authenticate MS, HLR/AuC and SGSN/VLR. Because the message sent to the HLR/AuC is encrypted using its public key KHU, there is no one except for the home HLR/AuC can decrypt the message. Therefore, authentication between the MS and the HLR/AuC can be achieved using KHU. Consequently, mutual authentication is achieved. Next, consider MS anonymity. To provide MS anonymity, the permanent identity IMSI of MS is never exposed in the plain-text mode. A cracker cannot get the real identity of MS by eavesdropping on the authentication messages on both wireless and wired networks. Consider the requirement of non-repudiation; our protocol can also satisfy this requirement. By using the one-way function, we can achieve non-repudiation. In the ith session, the user provides n-i (M) to ask for a connection. The SGSN/VLR can verify the correctness of n-i (M) by means of the one way function, but it cannot derive n-i (M) from n-i+1(M). In this way, n-i (M) can be used th as a proof of the i connection. Whenever a random challenge occurs, the SGSN/VLR can be n-i required to show (M). The requirement of end-to-end security is also addressed in the proposed protocol. When a MS makes a call, the caller and callee negotiate a common encryption key to encrypt the data flowing over the channel. Since the full communication path is protected, data confidentiality and integrity are both achieved. The communication between the two parties in both wired and wireless paths is protected with the encryption key Ke. Therefore, end-to-end security is achieved in this way. The proposed authentication protocol achieves all the requirements shown above. The proposed scheme is superior to other published schemes. The proposed protocol can prevent common attacks as follows:
i. Replay Attacks
It can repulse replay attack, a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. Hackers capture old messages and replay them at later times. By replying to the message it appears to be legal. Suppose MS wants to prove its identity to the HLR. The HLR requests its IMSI as proof of identity, which MS dutifully provides (possibly after some transformation like a hash function). Meanwhile, the hacker is eavesdropping on the conversation and keeps the IMSI. After the interchange is over, the hacker connects to the HLR posing as the first MS. When asked for proof of identity, the hacker sends the first MSs IMSI read from the last session, which the HLR must accept. The proposed authentication protocol can prevent the replay attack by the freshness properties. The MS refreshes the session key by using the nonce to ensure the freshness of authentication sessions. Since the MS and SGSN/VLR must input IK to generate a new session key; the session key can be refreshed for each authentication process. If an attacker replaces the TMSI of an intercepted authentication message and replays the authentication request, the attack will not succeed because the AUTHMH is encrypted using KHM, so the replay attack is infeasible.
46
47
Comparison with Items Symmetric or Asymmetric Mutual authentication between MS and HN Mutual authentication between MS and SN Confidentiality of user identity during roaming User Traffic Confidentiality True non-repudiation of service Signaling data integrity Reduction of bandwidth consumption between SN and HN Reduction of storage space overhead for SNs database Element synchronization between MS and HN
UMTS Sym
The simulation in this thesis was executed 20 times. The results of the 20 simulations were then averaged to obtain accurate results. The length of the communication system simulation was run for several hundreds of seconds (400 seconds) in order to obtain accurate and consistency results and reaches a steady state not influenced by short time differences. Simulations were performed on an Intel P4 1.67 GHz machine with 512MB of RAM. The results show that the authentication delay is minimized when compared with the current protocol, as illustrated in figure 6. Therefore, the performance and the authentication delay time have been improved significantly.
8. CONCLUSION
A novel mutual authentication scheme based on integrating the public key with the hash-chaining technique has been proposed. This scheme provides secure authentication mechanisms for mobile systems where the concepts of TMSI and key refreshment are adopted. Using TMSI can protect the subscribers true identity, and key refreshment can make authentication process more secure. In addition, the bi-unilateral and mutual authentication among UE, VLR and HLR have been adopted that resulted in a more secure protocol than the other available authentication protocols. This proposed protocol fulfills the security requirements of the third generation mobile systems. Analysis of our protocol showed that it can not only overcome the security flaws existing in some recently proposed protocols, but also satisfy the asymmetric wireless computing conditions. In addition, this proposed authentication scheme does not only protect user data, but also it prevents many kinds of attacks such as the replay attacks and Guessing attacks.
48
The proposed protocol achieved the following goals: 1. Provides mutual authentication between the user MS and the HN. 2. Provides mutual authentication between the user MS and the SN. 3. The establishment of a cipher key and an integrity key upon successful authentication. 4. Reduces the signaling traffic between serving network and home network and reduces the size of authentication information to be stored in the serving network. 5. Element synchronization between MS and HN. 6. HN allows SN to authenticate MS, then VLR/SN authenticates MS without any intervention from the subscribers HN
9. REFERENCES
[1] Al-Saraireh J., and Yousef S., "A New Authentication Protocol for UMTS Mobile Networks", EURASIP Journal on wireless communications and networking, vol. 2006, pp. 1-10, Article ID 98107, 2006. Salgarelli L., Buddhikot M., Garay J., Patel S., and Miller S.. "The Evaluation of wireless LANs and PANs Efficient Authentication and Key Distribution in Wireless IP Networks". IEEE Personal Communication on Wireless Communication, vol. 10, no. 6, pp. 52-61, 2003. Al-Saraireh J., and Yousef S., "Analytical Model: Authentication Transmission Overhead Between Entities in Mobile Networks", Elsevier, Computer Communications Journal, vol. 30, no. 9, pp. 1713-1720, 2007. Zhang M., and Fang Y., "Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol", IEEE Transactions on wireless communications, vol. 4, no. 2, pp. 734 742, 2005. 3GPP, "3G Security, Specification of the MILENAGE Algorithm Set: An Example Algorithm Set for the 3GPP Authentication and Key Generation Functions f1, f1*, f2, f3, f4, f5 and f5*, document 1: General", 3rd Generation Partnership Projec, 2001. Cheng S., Shieh S., Yang W., Lee F., and Luo J., "Designing Authentication Protocols for Third Generation Mobile Communication Systems", Journal of Information Science and Engineering, vol. 21, pp. 361-378, 2005. Brutch T., and Brutch P., "Mutual authentication, confidentiality, and key Management (MACKMAN) system for mobile computing and wireless communication", Proceedings of the 14th Annual Computer Security Applications Conference, pp. 308-317, 1998. Dell'Uommo S., and Scarrone E., "The mobility management and authentication authorization mechanisms in mobile networks beyond 3G", Proceedings of the 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 4449, 2001, Horn G., Martin K., and Mitchell C., "Authentication Protocols for Mobile Network Environment Value-Added Services", IEEE Transactions on Vehicular Technology, vol. 51, no. 2, pp. 383-392, 2002. Lee C., Hwang M., and Yang W., "Enhanced Privacy and Authentication for the Global System for Mobile Communications", Wireless network Journal, Kluwer Academic Publishers, vol. 5, no. 3, pp. 231-234, 1999. Lee C., Hwang M., and Yang W., "Extension of Authentication Protocol for GSM", IEE Proceeding Communication, vol. 150, no. 2, pp. 91-95, 2003.
[2]
[3] [4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
49
Lee C., Li L., and Hwang M., "A remote User Authentication Scheme Using Hash Function", ACM Operating Systems Review, vol. 36 no. 4, pp. 23-29, 2002. Lin C., and Shieh S., "Chain authentication in mobile communication systems", Journal of Telecommunication Systems, vol. 13, pp. 213-240, 2000. Looi M.,"Enhanced authentication services for internet systems using mobile networks", IEEE Global Telecommunications Conference, vol. 6, pp. 3468-3472, 2001. Molva R., Samfat D., and Tsudik G., "Authentication of Mobile Users", IEEE Network, vol. 8, no. 2, pp. 26-34, 1994. Putz S., and Schmitz R. (2000), "Secure Interoperation between 2G and 3G Mobile Radio Networks", 3G Mobile Communication Technologies, 2000, First International Conference on (IEE Conference Publication No. 471), London, UK, Pp. 28-32. Putz S., Schmitz R., Tonsing F., "Authentication Schemes for Third Generation. Mobile Radio Systems", Personal, Indoor and Mobile Radio Communication., The 9th IEEE International Symposium on Personal, vol. 1, pp. 126-130, 1998. Park C., "On Certificate-Based Security Protocols for Wireless Mobile Communication Systems", IEEE Network, vol. 11, no. 5, pp. 50-55, 1997. Grecas C., Maniatis S., and Venieris I., "Towards the introduction of the asymmetric cryptography in GSM,GPRS, and UMTS networks", Sixth IEEE Symposium on Computers and Communications, Proceedings, pp. 15-21, 2001. Argyroudis G., Verma R., Tewari H., and Mahony D., "Performance Analysis of Cryptographic Protocols on Handheld Devices", 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004) Proceeding, pp. 169 174, 2004. Kambourakis G., Rouskas A., and Gritzalis S., "Using SSL/TLS in Authentication and Key Agreement Procedures of Future Mobile Networks", IEEE 4th International Workshop on Mobile and Wireless Communications Network, vol. 2002 , pp. 152 156, 2002. Kambourakis G., Rouskas A., and Gritzalis S., "Advanced SSL/TLS-Based Authentication for Secure WLAN-3G Interworking", IEE Communications, vol. 151, no. 5, pp. 501-506, 2004. Huang C., and Li J., "Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption", AINA2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05), vol. 1, pp. 392-397, 2005. Zhang M., "Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol", Cryptology ePrint Archive, Report 2003/092, 2003. [online]. Last accessed on 10 April 2006 as Available at http://eprint.iacr.org, 2003 Zhang Y., and Fujise M., "An Improvement for Authentication Protocol in Third-Generation Wireless Networks", IEEE Transaction on Wireless Communications, vol. 5, no. 9, pp. 2348-2352, 2006. Zhang Y., and Fujise M., "Security Management in the Next Generation Wireless Networks", International Journal of Network Security, vol.3, no.1, pp. 1-7, 2006. Adi W., Dawood A., Mabrouk A., and Musa S. , "Low complexity image authentication for mobile applications", IEEE South East Conference, Richmond, USA, pp. 20-20, 2007.
[17]
[18] [19]
[20]
[21]
[22]
[23]
[24]
[25]
[26] [27]
50
[28]
Yijun H., Nan X., and Jie L., "A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communication", IEEE International Conference on Availability, Reliability and Security, ARES07, Vienna, Austria, pp. 558 563, 2007. Lin Y, and Chen Y., "Reducing Authentication Signaling Traffic in Third-Generation Mobile Network", IEEE Transactions on Wireless Communications, vol. 2, no. 3, pp. 493-501, 2003. Harn L., and Hsin W., "On the Security of Wireless Network Access with Enhancements", Proceedings of the 2003 ACM workshop on Wireless Security, San Diego, USA, pp. 88-95, 2003. Burnett S. and Pause S, "RSA Security's Official Guide to CRYPTOGRAPHY", McGrawn, Hill, 2002. Lamport L., "Password authentication with insecure communication", Communication of ACM, Vol. 24, No. 11, pp. 770-772, 1981. Al-Fayoumi M., Nashwan S., Yousef S. and Alzoubaidi A., "A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks", Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob, pp. 29-38, 2007 Lacy, J., Mitchell, D. and Schell, W., "CryptoLib: Cryptography in Software." Proc. Fourth USENIX Security Workshop, October 1993. M.J. Belier, L. Chang, and Y. Yacobi, "Privacy and Authentication on a Portable Communications System", Global Telecommunications Conference, pp 1922- 1927, Dec. 2-5, 1991. M. Hwang, S. Chong and H. Ou, On the security of an enhanced UMTS authentication and key agreement protocol, European Transactions on Telecommunications, Vol. 22, Issue 3, pp. 99112, April 2011
[29]
[30]
[34] [35]
[36]
51
INSTRUCTIONS TO CONTRIBUTORS
Information Security is an important aspect of protecting the information society from a wide variety of threats. The International Journal of Security (IJS) presents publications and research that builds on computer security and cryptography and also reaches out to other branches of the information sciences. Our aim is to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. It is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them. To build its International reputation, we are disseminating the publication information through Google Books, Google Scholar, Directory of Open Access Journals (DOAJ), Open J Gate, ScientificCommons, Docstoc and many more. Our International Editors are working on establishing ISI listing and a good impact factor for IJS. The initial efforts helped to shape the editorial policy and to sharpen the focus of the journal. Starting with volume 5, 2011, IJS appears in more focused issues. Besides normal publications, IJS intend to organized special issues on more focused topics. Each special issue will have a designated editor (editors) either member of the editorial board or another recognized specialist in the respective field. We are open to contributions, proposals for any topic as well as for editors and reviewers. We understand that it is through the effort of volunteers that CSC Journals continues to grow and flourish. IJS LIST OF TOPICS The realm of International Journal of Security (IJS) extends, but not limited, to the following:
Anonymity Attacks, security mechanisms, and security service Authorisation Cellular/wireless/mobile/satellite networks securi Public key cryptography and key management Cryptography and cryptanalysis Data integrity issues Database security Denial of service attacks and countermeasures Design or analysis of security protocols Distributed and parallel systems security Formal security analyses Information flow Intellectual property protection
Anonymity and pseudonymity Code security, including mobile code security Biometrics Authentication Confidentiality, privacy, integrity, authenticatio Data confidentiality issues Data recovery Denial of service Dependability and reliability Distributed access control Electronic commerce Fraudulent usage Information hiding and watermarking Intrusion detection
Key management Network and Internet security Network security performance evaluation Peer-to-peer security Privacy protection Revocation of malicious parties Secure location determination Secure routing protocols Security in ad hoc networks Security in communications Security in distributed systems Security in e-mail Security in integrated networks Security in internet and WWW Security in mobile IP Security in peer-to-peer networks Security in sensor networks Security in wired and wireless integrated networks Security in wireless communications Security in wireless LANs (IEEE 802.11 WLAN, WiFi, Security in wireless PANs (Bluetooth and IEEE 802. Security specification techniques Tradeoff analysis between performance and security Viruses worms and other malicious code
Multicast security Network forensics Non-repudiation Prevention of traffic analysis Computer forensics Risk assessment and management Secure PHY/MAC/routing protocols Security group communications Security in cellular networks (2G, 2.5G, 3G, B3G, Security in content-delivery networks Security in domain name service Security in high-speed networks Security in integrated wireless networks Security in IP networks Security in optical systems and networks Security in satellite networks Security in VoIP Security in Wired Networks Security in wireless internet Security in wireless MANs (IEEE 802.16 and WiMAX) Security policies Security standards Trust establishment WLAN and Bluetooth security
CALL FOR PAPERS Volume: 5 - Issue: 2 - July 2011 i. Paper Submission: July 31, 2011 ii. Author Notification: September 01, 2011
CONTACT INFORMATION
Computer Science Journals Sdn BhD M-3-19, Plaza Damas Sri Hartamas 50480, Kuala Lumpur MALAYSIA Phone: 006 03 6207 1607 006 03 2782 6991 Fax: 006 03 6207 1697
Email: cscpress@cscjournals.org