Authentication of mobile users in third generation mobile systems

被引:25
|
作者
Tzeng, ZJ [1 ]
Tzeng, WG [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 30050, Taiwan
关键词
IMT-2000; third-generation mobile systems; GSM; authentication protocol; mobile computing;
D O I
10.1023/A:1026530706019
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The goal of the third-generation mobile systems is to provide worldwide operation, enhance service capabilities, and improve performance over the second-generation mobile systems. In this paper, we propose an authentication procedure for third-generation mobile systems. The authentication procedure is a protocol suite consisting of two subprotocols: a certificate-based authentication (CBA) protocol and a ticket-based authentication (TBA) protocol. Only two parties, MS and VLR, are involved in executing our protocol. Our authentication procedure uses both public- and secret-key cryptosystems. Our authentication procedure not only provides uniform authentication across domains, but also reduces computational costs in the process of repeated authentication. We provide firm proof of our procedure's correctness.
引用
收藏
页码:35 / 50
页数:16
相关论文
共 50 条
  • [1] Authentication of Mobile Users in Third Generation Mobile Systems
    Zhi-Jia Tzeng
    Wen-Guey Tzeng
    [J]. Wireless Personal Communications, 2001, 16 : 35 - 50
  • [2] Authentication schemes for third generation mobile radio systems
    Pütz, S
    Schmitz, R
    Tönsing, F
    [J]. NINTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-3, 1998, : 126 - 130
  • [3] Advanced subscriber authentication approaches for third generation mobile systems
    Clarke, NL
    Furnell, SM
    Reynolds, PL
    Rodwell, PM
    [J]. THIRD INTERNATIONAL CONFERENCE ON 3G MOBILE COMMUNICATION TECHNOLOGIES, 2002, (489): : 319 - 323
  • [4] Designing authentication protocols for third generation mobile communication systems
    Cheng, SM
    Shieh, SP
    Yang, WH
    Lee, FY
    Luo, JN
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2005, 21 (02) : 361 - 378
  • [5] Third generation mobile systems
    Groves, IS
    Clapton, AJ
    [J]. BT TECHNOLOGY JOURNAL, 1996, 14 (03): : 115 - 122
  • [6] AUTHENTICATION OF MOBILE USERS
    MOLVA, R
    SAMFAT, D
    TSUDIK, G
    [J]. IEEE NETWORK, 1994, 8 (02): : 26 - 34
  • [7] Third generation mobile systems planning issues
    Menolascino, R
    Pizarroso, M
    Lepschy, C
    Salas, B
    [J]. 48TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-3, 1998, : 830 - 834
  • [8] Beyond third generation mobile communication systems
    Radhamani, G
    Umamaheswari, S
    Siddiqi, MU
    [J]. PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 779 - 786
  • [9] Mobile positioning for third generation WCDMA systems
    Cedervall, M
    [J]. ICUPC '98 - IEEE 1998 INTERNATIONAL CONFERENCE ON UNIVERSAL PERSONAL COMMUNICATIONS, VOLS 1 AND 2, 1998, 1-2 : 1373 - 1377
  • [10] European third-generation mobile systems
    Dasilva, JS
    Arroyo, B
    Barani, B
    Ikonomou, D
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1996, 34 (10) : 68 - &