Authentication of Mobile Users in Third Generation Mobile Systems

被引:0
|
作者
Zhi-Jia Tzeng
Wen-Guey Tzeng
机构
[1] National Chiao Tung University,Department of Computer and Information Science
来源
关键词
IMT-2000; third-generation mobile systems; GSM; authentication protocol; mobile computing;
D O I
暂无
中图分类号
学科分类号
摘要
The goal of the third-generation mobile systems is to provide worldwide operation, enhance service capabilities, and improve performance over the second-generation mobile systems. In this paper, we propose an authentication procedure for third-generation mobile systems. The authentication procedure is a protocol suite consisting of two subprotocols: a certificate-based authentication (CBA) protocol and a ticket-based authentication (TBA) protocol. Only two parties, MS and VLR, are involved in executing our protocol. Our authentication procedure uses both public- and secret-key cryptosystems. Our authentication procedure not only provides uniform authentication across domains, but also reduces computational costs in the process of repeated authentication. We provide firm proof of our procedure's correctness.
引用
收藏
页码:35 / 50
页数:15
相关论文
共 50 条
  • [21] Security for the core network of third generation mobile systems
    Horn, G
    Kröselberg, D
    Pütz, S
    Schmitz, R
    COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY, 2001, 64 : 297 - 312
  • [22] Video transmission for third generation mobile communication systems
    Gharavi, H
    2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS: COMMUNICATIONS FOR NETWORK-CENTRIC OPERATIONS: CREATING THE INFORMATION FORCE, 2001, : 1146 - 1151
  • [23] Harmonization of global third-generation mobile systems
    Zeng, M
    Annamalai, A
    Bhargava, VK
    IEEE COMMUNICATIONS MAGAZINE, 2000, 38 (12) : 94 - 104
  • [24] Development of mobile communications systems beyond third generation
    Mohr, W
    WIRELESS PERSONAL COMMUNICATIONS, 2001, 17 (2-3) : 191 - 207
  • [25] Mobility support in evolving Third Generation mobile systems
    Morris, C
    Nelson, J
    GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION, 1998, : 2580 - 2585
  • [26] Location management methods for third generation mobile systems
    Tabbane, S
    IEEE COMMUNICATIONS MAGAZINE, 1997, 35 (08) : 72 - &
  • [27] An improvement of mobile users authentication in the integration environments
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Yang, Wei-Pang
    AEU-Archiv fur Elektronik und Ubertragungstechnik, 2002, 56 (05): : 293 - 297
  • [28] Authentication of users of mobile devices by their motor reactions
    Nechiporenko A.S.
    Gubarenko E.V.
    Gubarenko M.S.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (12): : 987 - 1003
  • [29] Authentication of mobile users in personal communication system
    Liu, JW
    Wang, YM
    PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1239 - 1242
  • [30] A secure and efficient authentication scheme for mobile users
    Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, 621, Taiwan
    不详
    不详
    不详
    不详
    Int. J. Mobile Commun., 2006, 5 (581-594):