Authentication of Mobile Users in Third Generation Mobile Systems

被引:0
|
作者
Zhi-Jia Tzeng
Wen-Guey Tzeng
机构
[1] National Chiao Tung University,Department of Computer and Information Science
来源
关键词
IMT-2000; third-generation mobile systems; GSM; authentication protocol; mobile computing;
D O I
暂无
中图分类号
学科分类号
摘要
The goal of the third-generation mobile systems is to provide worldwide operation, enhance service capabilities, and improve performance over the second-generation mobile systems. In this paper, we propose an authentication procedure for third-generation mobile systems. The authentication procedure is a protocol suite consisting of two subprotocols: a certificate-based authentication (CBA) protocol and a ticket-based authentication (TBA) protocol. Only two parties, MS and VLR, are involved in executing our protocol. Our authentication procedure uses both public- and secret-key cryptosystems. Our authentication procedure not only provides uniform authentication across domains, but also reduces computational costs in the process of repeated authentication. We provide firm proof of our procedure's correctness.
引用
收藏
页码:35 / 50
页数:15
相关论文
共 50 条
  • [41] Cluster mobile switching center for third generation wireless systems
    La Porta, TF
    Ramjee, R
    Murakami, K
    Buskens, R
    Lin, YJ
    NINTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-3, 1998, : 121 - 125
  • [42] Mobility modeling in third-generation mobile telecommunications systems
    Markoulidakis, JG
    Lyberopoulos, GL
    Tsirkas, DF
    Sykas, ED
    IEEE PERSONAL COMMUNICATIONS, 1997, 4 (04): : 41 - 56
  • [43] Traffic model for third generation cellular mobile telecommunication systems
    Natl Technical Univ of Athens, Athens, Greece
    Wireless Networks, 5 (389-400):
  • [44] Third generation (3G) mobile communications systems
    Garg, VK
    Halpern, S
    Smolik, KF
    1999 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 1999, : 39 - 43
  • [45] Traffic model for third generation cellular mobile telecommunication systems
    Markoulidakis, JG
    Lyberopoulos, GL
    Anagnostou, ME
    WIRELESS NETWORKS, 1998, 4 (05) : 389 - 400
  • [46] Third generation mobile communication systems: overview and modelling considerations
    Godara, Lal C.
    Ryan, Michael J.
    Padovan, Nico
    Annales des Telecommunications/Annals of Telecommunications, 1999, 54 (1-2): : 114 - 136
  • [47] Network performance assessment platform for third generation mobile systems
    Mirra, D
    Pascali, F
    Demesticha, VP
    Karagiannis, D
    Demestichas, PP
    Theologou, ME
    ICUPC '98 - IEEE 1998 INTERNATIONAL CONFERENCE ON UNIVERSAL PERSONAL COMMUNICATIONS, VOLS 1 AND 2, 1998, 1-2 : 1175 - 1179
  • [48] Special issue on third generation land mobile communication systems
    Sasaoka, H
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1998, E81B (07) : 1297 - 1298
  • [49] Authentication in the Clouds: A Framework and its Application to Mobile Users
    Chow, Richard
    Jakobsson, Markus
    Masuoka, Ryusuke
    Molina, Jesus
    Niu, Yuan
    Shi, Elaine
    Song, Zhexuan
    PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), 2010, : 1 - 6
  • [50] Authentication of users on mobile telephones - A survey of attitudes and practices
    Clarke, NL
    Furnell, SM
    COMPUTERS & SECURITY, 2005, 24 (07) : 519 - 527