Chain authentication in mobile communication systems

被引:0
|
作者
Chern-Tang Lin
Shiuh-Pyng Shieh
机构
[1] National Chiao Tung University,Department of Computer Science and Information Engineering
来源
Telecommunication Systems | 2000年 / 13卷
关键词
Service Provider; Mobile User; Authentication Scheme; Authentication Protocol; Secret Information;
D O I
暂无
中图分类号
学科分类号
摘要
Digital mobile telecommunication systems have become a future trend in personal communications services (PCS) networks. To satisfy the demand for high quality services, security functions, including the authentications of communication parties and the confidentiality of communication channels, must be embedded into mobile communication systems. This work presents an authentication scheme to support the security functions. The proposed protocol significantly improves the performance of authentications and ensures the security of mobile communications in a large-scale communication network with multiple service providers.
引用
收藏
页码:213 / 240
页数:27
相关论文
共 50 条
  • [31] Mobile agent based network secure authentication mechanism in mobile communication system
    Deng, Wei
    Chen, Ming-qi
    Ai, Bo
    Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications, 2000, 23 (04): : 93 - 96
  • [32] Validation of authentication protocols for mobile satellite systems
    Beheshtifard, Saeed
    INTERNATIONAL JOURNAL OF ADVANCED BIOTECHNOLOGY AND RESEARCH, 2016, 7 : 1517 - 1521
  • [33] Privacy and Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Chi, Haotian
    Li, Hui
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (03) : 1713 - 1731
  • [34] An improved authentication approach for mobile DRM systems
    Wang, Liang
    Zhang, Runtong
    Advances in Information Sciences and Service Sciences, 2012, 4 (23): : 198 - 206
  • [35] Mutual authentication protocol for mobile RFID systems
    Zhou, Jingxian
    Zhou, Yajian
    Xiao, Feng
    Niu, Xinxin
    Journal of Computational Information Systems, 2012, 8 (08): : 3261 - 3268
  • [36] Scaling Pseudonymous Authentication for Large Mobile Systems
    Khodaei, Mohammad
    Noroozi, Hamid
    Papadimitratos, Panos
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 174 - 185
  • [37] Privacy and Authentication Protocol for Mobile RFID Systems
    Ben Niu
    Xiaoyan Zhu
    Haotian Chi
    Hui Li
    Wireless Personal Communications, 2014, 77 : 1713 - 1731
  • [38] A new authentication protocol for portable communication systems
    Xu, SB
    Jansen, C
    van Tilborg, H
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 216 - 230
  • [39] A New Authentication Protocol in Portable Communication Systems
    Qi, Ai-qin
    Shen, Yong-jun
    2015 4TH INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL PROTECTION (ICEEP 2015), 2015, : 2123 - 2127
  • [40] An enhanced authentication protocol for personal communication systems
    Stach, JS
    Park, EK
    Su, Z
    1998 IEEE WORKSHOP ON APPLICATION-SPECIFIC SOFTWARE ENGINEERING AND TECHNOLOGY (ASSET 98) - PROCEEDINGS, 1998, : 128 - 132