A Study on the Security Structure and Authentication Procedure in ATM


The Transactions of the Korea Information Processing Society (1994 ~ 2000), Vol. 6, No. 1, pp. 107-114, Jan. 1999
10.3745/KIPSTE.1999.6.1.107,   PDF Download:

Abstract

Recently as services in ATM are diversified, the need for security has been increased. But when added the security features in ATM, the compatibility and transparency with existing systems must be considered after analyzing threats of security. This paper designs the security protocol in ATM protocol stack and defines the promitives and processing procedure of messages which are needed in the security layer. Also, this paper presents the authentication and key distribution procedure which can be adopted at call establishment. The presented authentication protocol can be used for point-to-point method as well as point-to-multipoint method. And the correctness of this protocol is verified using GNY logic.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. H. Young and R. H. Bin, "A Study on the Security Structure and Authentication Procedure in ATM," The Transactions of the Korea Information Processing Society (1994 ~ 2000), vol. 6, no. 1, pp. 107-114, 1999. DOI: 10.3745/KIPSTE.1999.6.1.107.

[ACM Style]
Shin Hyo Young and Ryou Hwang Bin. 1999. A Study on the Security Structure and Authentication Procedure in ATM. The Transactions of the Korea Information Processing Society (1994 ~ 2000), 6, 1, (1999), 107-114. DOI: 10.3745/KIPSTE.1999.6.1.107.