首页 | 本学科首页   官方微博 | 高级检索  
     


Authentication of Mobile Users in Third Generation Mobile Systems
Authors:Tzeng  Zhi-Jia  Tzeng  Wen-Guey
Affiliation:(1) Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan, 30050, ROC
Abstract:The goal of the third-generation mobile systems is to provide worldwide operation, enhance service capabilities, and improve performance over the second-generation mobile systems. In this paper, we propose an authentication procedure for third-generation mobile systems. The authentication procedure is a protocol suite consisting of two subprotocols: a certificate-based authentication (CBA) protocol and a ticket-based authentication (TBA) protocol. Only two parties, MS and VLR, are involved in executing our protocol. Our authentication procedure uses both public- and secret-key cryptosystems. Our authentication procedure not only provides uniform authentication across domains, but also reduces computational costs in the process of repeated authentication. We provide firm proof of our procedure's correctness.
Keywords:IMT-2000  third-generation mobile systems  GSM  authentication protocol  mobile computing
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号