The research and implementation of 3G terminal authentication service

被引:0
|
作者
Fangzhou Zhang [1 ]
Xiaoyu Sheng [1 ]
机构
[1] Daqing Petr Inst, Sch Comp & Informat Technol, Daqing 163318, Peoples R China
关键词
3G; Security algorithms; Authentication; Security services;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Through analyzing the 3G security services structure, we found that 3GPP did not offer effective authentication services to the terminal client in application domain. On the base of analyzing the Kerberos authentication method and the 3G security mechanism, we first put forward a three-tier security authentication service model for 3G terminal application. The model assembled and encapsulated the 3G security algorithm, and offered a reliable, Proactive and convenient authentication services to the 3G terminal application. This research provided strong support with 3G terminal application.
引用
收藏
页码:38 / 40
页数:3
相关论文
共 50 条
  • [21] An architecture for a distributed 3G mobile terminal
    Constantinou, A
    Amery, P
    Reynolds, P
    THIRD INTERNATIONAL CONFERENCE ON 3G MOBILE COMMUNICATION TECHNOLOGIES, 2002, (489): : 459 - 463
  • [22] Design and implementation of 3G video surveillance terminal based on Hi3512 chip
    Chen J.
    Ye H.
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2011, 41 (SUPPL. 1): : 116 - 119
  • [23] The research on the pricing system of mobile value-added service for 3G
    Zhang Ke
    Cai Zhen-hua
    Lv Ting-Jie
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (14TH) VOLS 1-3, 2007, : 234 - 238
  • [24] Research on the Content-Based Billing of Mobile Data Service for 3G
    Zhang Ke
    Cai Zhen-hua
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3192 - 3195
  • [25] A satellite based localisation service using a 3G mobile phone as an emergency terminal.
    Petrek, Jozef
    2015 25TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA), 2015, : 415 - 418
  • [26] 3G or not 3G
    Hall, John
    Electronic Product Design, 2002, 23 (12):
  • [27] A Real Implementation of DPI in 3G Network
    Lu, Xiaoming
    Cao, Weihua
    Huang, Xusheng
    Huang, Feiyi
    He, Liwen
    Yang, Wenhong
    Wang, Shaobin
    Zhang, Xiaotong
    Chen, Hongsong
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [28] Authentication and billing protocols for the integration of WLAN and 3G networks
    Tseng, YM
    Yang, CC
    Su, JH
    WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 351 - 366
  • [29] Secure 3G user authentication in adhoc serving networks
    Durresi, Arjan
    Evans, Lyn
    Paruchuri, Vamsi
    Barolli, Leonard
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 488 - +
  • [30] Imroved authentication for IMS registration in 3G/WLAN interworking
    Celentano, D.
    Fresa, A.
    Longo, M.
    Robustelli, A. L.
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 2794 - +