Authentication of Mobile Users in Third Generation Mobile Systems

被引:0
|
作者
Zhi-Jia Tzeng
Wen-Guey Tzeng
机构
[1] National Chiao Tung University,Department of Computer and Information Science
来源
关键词
IMT-2000; third-generation mobile systems; GSM; authentication protocol; mobile computing;
D O I
暂无
中图分类号
学科分类号
摘要
The goal of the third-generation mobile systems is to provide worldwide operation, enhance service capabilities, and improve performance over the second-generation mobile systems. In this paper, we propose an authentication procedure for third-generation mobile systems. The authentication procedure is a protocol suite consisting of two subprotocols: a certificate-based authentication (CBA) protocol and a ticket-based authentication (TBA) protocol. Only two parties, MS and VLR, are involved in executing our protocol. Our authentication procedure uses both public- and secret-key cryptosystems. Our authentication procedure not only provides uniform authentication across domains, but also reduces computational costs in the process of repeated authentication. We provide firm proof of our procedure's correctness.
引用
收藏
页码:35 / 50
页数:15
相关论文
共 50 条
  • [31] POSTER: A Behavioural Authentication System for Mobile Users
    Islam, Md Morshedul
    Safavi-Naini, Reihaneh
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1742 - 1744
  • [32] Pervasive authentication and authorization infrastructures for mobile users
    Forne, Jordi
    Hinarejos, Francisca
    Marin, Andres
    Almenarez, Florina
    Lopez, Javier
    Montenegro, Jose A.
    Lacoste, Marc
    Diaz, Daniel
    COMPUTERS & SECURITY, 2010, 29 (04) : 501 - 514
  • [33] Efficient Authentication and Authorization Infrastructure for Mobile Users
    Jin, Zhen Ai
    Lee, Sang-Eon
    Yoo, Kee Young
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, 2008, 4977 : 155 - +
  • [34] An improvement of mobile users authentication in the integration environments
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Yang, Wei-Pang
    2002, Elsevier GmbH (56)
  • [35] An improvement of mobile users authentication in the integration enviromnents
    Hwang, MS
    Lee, CC
    Yang, WP
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2002, 56 (05) : 293 - 297
  • [36] Third Generation Mobile Reality
    1600, Swinburne University of Technology, PO Box 218, HAWTHORN VIC 3122, Australia (53):
  • [37] Traffic model for third generation cellular mobile telecommunication systems
    J.G. Markoulidakis
    G.L. Lyberopoulos
    M.E. Anagnostou
    Wireless Networks, 1998, 4 : 389 - 400
  • [38] Location management methods for third-generation mobile systems
    ESPTT
    IEEE Commun Mag, 8 (72-84):
  • [39] Third generation mobile communication systems: overview and modelling considerations
    Godara, LC
    Ryan, MJ
    Padovan, N
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 1999, 54 (1-2): : 114 - 136
  • [40] Paving the way to third-generation mobile systems in Europe
    Grillo, D
    IEEE PERSONAL COMMUNICATIONS, 1998, 5 (02): : 5 - 5