Chain authentication in mobile communication systems

被引:0
|
作者
Chern-Tang Lin
Shiuh-Pyng Shieh
机构
[1] National Chiao Tung University,Department of Computer Science and Information Engineering
来源
Telecommunication Systems | 2000年 / 13卷
关键词
Service Provider; Mobile User; Authentication Scheme; Authentication Protocol; Secret Information;
D O I
暂无
中图分类号
学科分类号
摘要
Digital mobile telecommunication systems have become a future trend in personal communications services (PCS) networks. To satisfy the demand for high quality services, security functions, including the authentications of communication parties and the confidentiality of communication channels, must be embedded into mobile communication systems. This work presents an authentication scheme to support the security functions. The proposed protocol significantly improves the performance of authentications and ensures the security of mobile communications in a large-scale communication network with multiple service providers.
引用
收藏
页码:213 / 240
页数:27
相关论文
共 50 条
  • [21] Secure anonymous authentication scheme without verification table for mobile satellite communication systems
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2014, 32 (05) : 443 - 452
  • [22] Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems
    Georgios Kambourakis
    Angelos Rouskas
    Stefanos Gritzalis
    EURASIP Journal on Wireless Communications and Networking, 2004 (1)
  • [23] Authentication of Mobile Users in Third Generation Mobile Systems
    Zhi-Jia Tzeng
    Wen-Guey Tzeng
    Wireless Personal Communications, 2001, 16 : 35 - 50
  • [24] Authentication of mobile users in third generation mobile systems
    Tzeng, ZJ
    Tzeng, WG
    WIRELESS PERSONAL COMMUNICATIONS, 2001, 16 (01) : 35 - 50
  • [25] Authentication and payment in future mobile systems
    Horn, G
    Preneel, B
    COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 277 - 293
  • [26] Authentication and payment in future mobile systems
    Siemens AG, Muenchen, Germany
    Journal of Computer Security, 2000, 8 (02) : 183 - 207
  • [28] Source authentication in group communication systems
    Zhao, X
    Prakash, A
    14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 455 - 459
  • [29] Improving Authentication function in wireless mobile multicast communication
    Mapoka, T. T.
    Shepherd, S. J.
    Anoh, K. O.
    Abd-Alhameed, R. A.
    Dama, Y. A. S.
    AlSabbagh, H. M.
    2015 INTERNET TECHNOLOGIES AND APPLICATIONS (ITA) PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE (ITA 15), 2015, : 399 - 404
  • [30] Delay-Aware Cooperative Caching for On-Chain Authentication in LEO Satellite Communication Systems
    Xiong, Ting
    Liu, Jiang
    Zhang, Ran
    Zhang, Xinyuan
    Luo, Changqing
    Huang, Tao
    Liu, Yunjie
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 3058 - 3063