Designing authentication protocols for third generation mobile communication systems

Shu Min Cheng*, Shiuh-Pyng Shieh, Wen Her Yang, F. U.Yuan Lee, Jia Ning Luo

*Corresponding author for this work

Research output: Contribution to journalArticle

3 Scopus citations

Abstract

Security is considered an important issue for mobile communication systems. In particular, the design of authentication mechanisms has received considerable research interest recently. However, most of the current authentication schemes for mobile systems only have simple security functions and usually have some weaknesses, such as leakage of user identities and high update overhead of temporary identities. Moreover, these schemes cannot fulfill the security requirements specified in third generation mobile systems (IMT-2000, UMTS). In this paper, we propose a secure and flexible authentication framework for mobile communication systems. In the proposed framework, service providers can dynamically choose authentication mechanisms without the cooperation of network operators in visited domains. Based on the new framework, a secure authentication protocol is proposed. The proposed protocol can satisfy the security requirements of third generation mobile systems and is secure against network attacks, such as the replay attack and substitution attack. In short, our approach is secure and practical such that it can satisfy the security requirements of third generation mobile communication systems.

Original languageEnglish
Pages (from-to)361-378
Number of pages18
JournalJournal of Information Science and Engineering
Volume21
Issue number2
StatePublished - 1 Mar 2005

Keywords

  • 3G communication systems
  • Authentication protocol
  • Flexible authentication framework
  • Mobile networks
  • Network security

Fingerprint Dive into the research topics of 'Designing authentication protocols for third generation mobile communication systems'. Together they form a unique fingerprint.

  • Cite this