Authentication Protocols for mobile network environment value-added services

被引:40
|
作者
Horn, G [1 ]
Martin, KM
Mitchell, CJ
机构
[1] Siemens AG, Corp Technol, D-81730 Munich, Germany
[2] Katholieke Univ Leuven, COSIC, ESAT, B-3001 Louvain, Belgium
[3] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
authentication; cryptography; data security; micropayments; mobile communications; protocols;
D O I
10.1109/25.994813
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The secure provision of mobile computing and telecommunication services is rapidly increasing in importance as both demand and applications for such services continue to grow. This paper is concerned with the design of public key based protocols suitable for application in upcoming third-generation mobile systems such as Universal Mobile Telecommunications Service. Candidate protocols are considered for the authentication of a mobile user to a value-added service provider with initialization of a mechanism enabling payment for the value-added service. A set of goals for such a protocol are identified, as are a number of generic attacks; these goals and attacks are then used to evaluate the suitability of seven candidate third-generation user-to-network authentication protocols. Many of these candidate protocols are shown to have highly undesirable features.
引用
收藏
页码:383 / 392
页数:10
相关论文
共 50 条
  • [11] Revenue-sharing analysis in the mobile value-added services
    Liu, Bing
    Tang, Shou-Lian
    Journal of China Universities of Posts and Telecommunications, 2006, 13 (04): : 102 - 105
  • [12] A comparative study of value-added mobile services in Finland and Taiwan
    Department of Information Management, National Kaohsiung First University of Science and Technology, No. 1 University Road, Yenchao, Kaohsiung Kaohsiung, Taiwan
    不详
    不详
    不详
    不详
    International Journal of Mobile Communications, 2006, 4 (04) : 436 - 458
  • [13] Value-Added Radiology Services
    Kalra, Naveen
    Khandelwal, Niranjan
    JOURNAL OF THE AMERICAN COLLEGE OF RADIOLOGY, 2012, 9 (01) : 84 - 85
  • [14] Extended 3PAKE authentication scheme for value-added services in VANETs
    Muthumeenakshi, R.
    Reshmi, T. R.
    Murugan, K.
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 27 - 38
  • [15] Cryptanalysis and Design of Anonymous Authentication Protocol for Value-Added Services in Internet of Vehicles
    Yao H.
    Yan Q.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (02): : 440 - 451
  • [16] Darwin: Customizable resource management for value-added network services
    Chandra, P
    Fisher, A
    Kosak, C
    Ng, TSE
    Steenkiste, P
    Takahashi, E
    Zhang, H
    SIXTH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 1998, : 177 - 188
  • [17] ROLE OF VALUE-ADDED SERVICES IN STRENGTHENING OF INDIA TELECOMMUNICATIONS NETWORK
    SRIVASTAVA, RK
    ELECTRONICS INFORMATION & PLANNING, 1994, 22 (03): : 159 - 162
  • [18] Darwin: Customizable resource management for value-added network services
    Chandra, P
    Chu, YH
    Fisher, A
    Gao, J
    Kosak, C
    Ng, TSE
    Steenkiste, P
    Takahashi, E
    Zhang, H
    IEEE NETWORK, 2001, 15 (01): : 22 - 35
  • [19] The facilitating role of smartphones in increasing use of value-added mobile services
    Tojib, Dewi
    Tsarenko, Yelena
    Sembada, Agung Y.
    NEW MEDIA & SOCIETY, 2015, 17 (08) : 1220 - 1240
  • [20] Research on Supervision on Mobile Value-added Services Based on Game Theory
    Zhao Di
    Jia Chuanliang
    MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 195-196 : 922 - +