Authentication of mobile users in third generation mobile systems

被引:25
|
作者
Tzeng, ZJ [1 ]
Tzeng, WG [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 30050, Taiwan
关键词
IMT-2000; third-generation mobile systems; GSM; authentication protocol; mobile computing;
D O I
10.1023/A:1026530706019
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The goal of the third-generation mobile systems is to provide worldwide operation, enhance service capabilities, and improve performance over the second-generation mobile systems. In this paper, we propose an authentication procedure for third-generation mobile systems. The authentication procedure is a protocol suite consisting of two subprotocols: a certificate-based authentication (CBA) protocol and a ticket-based authentication (TBA) protocol. Only two parties, MS and VLR, are involved in executing our protocol. Our authentication procedure uses both public- and secret-key cryptosystems. Our authentication procedure not only provides uniform authentication across domains, but also reduces computational costs in the process of repeated authentication. We provide firm proof of our procedure's correctness.
引用
收藏
页码:35 / 50
页数:16
相关论文
共 50 条
  • [21] Mobility support in evolving Third Generation mobile systems
    Morris, C
    Nelson, J
    [J]. GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION, 1998, : 2580 - 2585
  • [22] Voice QoS in third-generation mobile systems
    Valkó, AG
    Rácz, A
    Fodor, G
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1999, 17 (01) : 109 - 123
  • [23] The development of third generation mobile telecommunication systems in China
    Song, XT
    Zho, ZH
    Li, YG
    [J]. 2002 3RD INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, 2002, : 681 - 684
  • [24] Mobile multimedia services for third generation communications systems
    Ravindran, A
    Liu, H
    Agoren, I
    Lackpour, A
    Miller, D
    Kavehrad, M
    Doherty, J
    [J]. IEEE 54TH VEHICULAR TECHNOLOGY CONFERENCE, VTC FALL 2001, VOLS 1-4, PROCEEDINGS, 2001, : 2589 - 2593
  • [25] Location management methods for third generation mobile systems
    Tabbane, S
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1997, 35 (08) : 72 - &
  • [26] An improvement of mobile users authentication in the integration environments
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Yang, Wei-Pang
    [J]. AEU-Archiv fur Elektronik und Ubertragungstechnik, 2002, 56 (05): : 293 - 297
  • [27] Authentication of mobile users in personal communication system
    Liu, JW
    Wang, YM
    [J]. PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1239 - 1242
  • [28] Authentication of users of mobile devices by their motor reactions
    Nechiporenko, A.S.
    Gubarenko, E.V.
    Gubarenko, M.S.
    [J]. Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (12): : 987 - 1003
  • [29] POSTER: A Behavioural Authentication System for Mobile Users
    Islam, Md Morshedul
    Safavi-Naini, Reihaneh
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1742 - 1744
  • [30] Pervasive authentication and authorization infrastructures for mobile users
    Forne, Jordi
    Hinarejos, Francisca
    Marin, Andres
    Almenarez, Florina
    Lopez, Javier
    Montenegro, Jose A.
    Lacoste, Marc
    Diaz, Daniel
    [J]. COMPUTERS & SECURITY, 2010, 29 (04) : 501 - 514