首页 | 本学科首页   官方微博 | 高级检索  
     

A Mixed Mechanism Mutual Authentication Protocol for TETRA
引用本文:LI Hui,YANG Yi-xianInformation Security Center,Beijing University of Posts and Telecommunications,Beijing 100876,P.R. China, National Key Lab,Beijing University of Posts and Telecommunications,Beijing 100876,P.R. China. A Mixed Mechanism Mutual Authentication Protocol for TETRA[J]. 中国邮电高校学报(英文版), 2005, 12(3)
作者姓名:LI Hui  YANG Yi-xianInformation Security Center  Beijing University of Posts and Telecommunications  Beijing 100876  P.R. China   National Key Lab  Beijing University of Posts and Telecommunications  Beijing 100876  P.R. China
作者单位:LI Hui,YANG Yi-xianInformation Security Center,Beijing University of Posts and Telecommunications,Beijing 100876,P.R. China; National Key Lab,Beijing University of Posts and Telecommunications,Beijing 100876,P.R. China
摘    要:1 Introduction TETRAsystemis a unified standard-based open sys-tem designed by European Telecommunications Stan-dards Institute(ETSI) in association with user organiza-tions, manufacturers ,testing and government authori-ties to satisfythe mobile communicationrequirements ofthe specialized institutions in all the European coun-tries .[1 ~4]A TETRAsystem supports many functionsonthe security field, which include authentication,airinterface encryption and end-to-end encryption.The au-then…


A Mixed Mechanism Mutual Authentication Protocol for TETRA
LI Hui,YANG Yi-xian. A Mixed Mechanism Mutual Authentication Protocol for TETRA[J]. The Journal of China Universities of Posts and Telecommunications, 2005, 12(3)
Authors:LI Hui  YANG Yi-xian
Abstract:The mutual authentication between the MS and Switching and Management Infrastructure (SwMI) in the TErrestrial Trunked RAdio (TETRA) system are analysed in this paper and theoretical analysis shows that some drawbacks exist when using the shared secrets in the Challenge-Response protocol: (1) It's difficult to store and maintain large amount of MS's authentication key in the SwMI when the network is large. (2) It's hard to support non-renouncement services when using the symmetrical cryptography. An authentication protocol for TETRA using Identity-based Public Keys for the SwMI to authenticate the MSs and an authentication protocol based on hash chain for the MSs to authenticate the SwMI are presented, which can effectively compensate the above-mentioned drawbacks.
Keywords:authentication  TETRA  Challenge-Response Protocol  Identity-based Public Key
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号