The research and implementation of 3G terminal authentication service

被引:0
|
作者
Fangzhou Zhang [1 ]
Xiaoyu Sheng [1 ]
机构
[1] Daqing Petr Inst, Sch Comp & Informat Technol, Daqing 163318, Peoples R China
关键词
3G; Security algorithms; Authentication; Security services;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Through analyzing the 3G security services structure, we found that 3GPP did not offer effective authentication services to the terminal client in application domain. On the base of analyzing the Kerberos authentication method and the 3G security mechanism, we first put forward a three-tier security authentication service model for 3G terminal application. The model assembled and encapsulated the 3G security algorithm, and offered a reliable, Proactive and convenient authentication services to the 3G terminal application. This research provided strong support with 3G terminal application.
引用
收藏
页码:38 / 40
页数:3
相关论文
共 50 条
  • [41] Implementation of signal processing algorithms for 3G and beyond
    Hausner, J
    Denk, R
    IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS, 2003, 13 (08) : 302 - 304
  • [42] 3G Intra Circle Roaming Implementation Techniques
    Adityan, R.
    Sayapaneni, Phaniram
    Elamaran, V.
    Agarwal, Ritesh A.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 714 - 720
  • [43] Efficient implementation for videoconferencing in 3G wireless networks
    Jia, Weijia
    Fu, Haohuan
    Shen, Ji
    Global Mobile Congress 2005, 2005, : 298 - 303
  • [44] Implementation of Soft Handover in 3G Using OPNET
    Rawal, Charu
    Sharma, Mukesh
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 208 - 211
  • [45] An Adoption of Kerberos to 3G Network for Mutual Authentication: Challenges and Evaluations
    Han, Chan-Kyu
    Choi, Hyoung-Kee
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2008, : 448 - +
  • [46] Extended authentication integrating scheme for beyond 3G wireless networks
    Jeong, JongMin
    Lee, GooYeon
    Moon, SangJae
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 413 - 423
  • [47] Research on Information Technology with Voiceprint Authentication Algorithm and its Implementation on Mobile Terminal
    Cao, Caifeng
    Liang, Huarong
    Liang, Guochao
    ADVANCED RESEARCH ON MATERIAL SCIENCE, ENVIROMENT SCIENCE AND COMPUTER SCIENCE III, 2014, 886 : 698 - 701
  • [48] Implementing an Affordable and Effective GSM IMSI Catcher with 3G Authentication
    Suraev, Max
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 239 - 256
  • [49] A Study on High Security Authentication Mechanism for 3G/WLAN Networks
    Wu, Wei-Chen
    Liaw, Horng-Twu
    UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 247 - 257
  • [50] Overview security analysis of 3G authentication protocols and technical specifications
    Cao, Chenlei
    Zhang, Ru
    Niu, Xinxin
    Zhou, Linna
    Zhang, Zhentao
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2193 - 2199