Authentication of mobile users in third generation mobile systems

被引:25
|
作者
Tzeng, ZJ [1 ]
Tzeng, WG [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 30050, Taiwan
关键词
IMT-2000; third-generation mobile systems; GSM; authentication protocol; mobile computing;
D O I
10.1023/A:1026530706019
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The goal of the third-generation mobile systems is to provide worldwide operation, enhance service capabilities, and improve performance over the second-generation mobile systems. In this paper, we propose an authentication procedure for third-generation mobile systems. The authentication procedure is a protocol suite consisting of two subprotocols: a certificate-based authentication (CBA) protocol and a ticket-based authentication (TBA) protocol. Only two parties, MS and VLR, are involved in executing our protocol. Our authentication procedure uses both public- and secret-key cryptosystems. Our authentication procedure not only provides uniform authentication across domains, but also reduces computational costs in the process of repeated authentication. We provide firm proof of our procedure's correctness.
引用
收藏
页码:35 / 50
页数:16
相关论文
共 50 条
  • [41] Network performance assessment platform for third generation mobile systems
    Mirra, D
    Pascali, F
    Demesticha, VP
    Karagiannis, D
    Demestichas, PP
    Theologou, ME
    [J]. ICUPC '98 - IEEE 1998 INTERNATIONAL CONFERENCE ON UNIVERSAL PERSONAL COMMUNICATIONS, VOLS 1 AND 2, 1998, 1-2 : 1175 - 1179
  • [42] Special issue on third generation land mobile communication systems
    Sasaoka, H
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 1998, E81B (07) : 1297 - 1298
  • [43] Authentication in the Clouds: A Framework and its Application to Mobile Users
    Chow, Richard
    Jakobsson, Markus
    Masuoka, Ryusuke
    Molina, Jesus
    Niu, Yuan
    Shi, Elaine
    Song, Zhexuan
    [J]. PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), 2010, : 1 - 6
  • [44] Authentication of users on mobile telephones - A survey of attitudes and practices
    Clarke, NL
    Furnell, SM
    [J]. COMPUTERS & SECURITY, 2005, 24 (07) : 519 - 527
  • [45] Chain authentication in mobile communication systems
    Chern-Tang Lin
    Shiuh-Pyng Shieh
    [J]. Telecommunication Systems, 2000, 13 : 213 - 240
  • [46] Authentication and payment in future mobile systems
    Horn, G
    Preneel, B
    [J]. COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 277 - 293
  • [47] Chain authentication in mobile communication systems
    Lin, CT
    Shieh, SP
    [J]. TELECOMMUNICATION SYSTEMS, 2000, 13 (2-4) : 213 - 240
  • [48] Third generation mobile: an exciting challenge
    Jones, K
    Tuttlebee, W
    Webb, W
    [J]. ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL, 2000, 12 (03): : 90 - 91
  • [49] Security in third Generation Mobile Networks
    Xenakis, C
    Merakos, L
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (07) : 638 - 650
  • [50] Mobile communications beyond third generation
    Mohr, W
    Becher, R
    [J]. IEEE VEHICULAR TECHNOLOGY CONFERENCE, FALL 2000, VOLS 1-6, PROCEEDINGS: BRINGING GLOBAL MOBILITY TO THE NETWORK AGE, 2000, : 654 - 661