个人通信系统中的一种移动用户登记认证协议
AUTHENTICATION PROTOCOL FOR MOBILE USER REGISTRATION IN PERSONAL COMMUNICATION SYSTEMS
-
摘要: 假冒和窃听攻击是无线通信面临的主要威胁。在个人通信系统中,为了对无线链路提供安全保护,必须对链路上所传送的数据/话音进行加密,而且在用户与服务网络之间必须进行相互认证。近年来,人们在不同的移动通信网络(如GSM,IS-41,CDPD,Wireless LAN等)中提出了许多安全协议。然而,这些协议在个人通信环境中应用时存在不同的弱点。本文基于个人通信系统的双钥保密与认证模型,设计了用户位置登记认证协议;并采用BAN认证逻辑对协议的安全性进行了形式化证明,也对协议的计算复杂性进行了定性分析。分析表明,所提出的协议与现有的协议相比具有许多新的安全特性。
-
关键词:
- 个人通信系统; 认证协议; BAN逻辑
Abstract: Impersonation and eavesdropping are the crucial threats in wireless communication systems. In personal communication systems (PCS), it is necessary to provide security protection on the voice/data transmitted over wireless links, and perform mutual authentication between mobile user and serving network. Recently, many protocols are proposed for different mobile networks, such as GSM, IS-41, CDPD and wireless LAN. However, these protocols have different weakness when they are applied in PCS environment. Based on the public-key PA model proposed by M.J. Beller, et al.(1993), this paper presents an authentication protocol for mobile user registration. Then the formalized security proof of the protocol using BAN authen- tication logic, and the qualitative analysis about its computing complexity are given. Results show that many new security features are added to the proposed protocols when it is compared with the protocols available. -
Vedder K. Security aspects of mobile communications. Computer Security and Industrial Cryp-[2]tology, Lecture Notes in Computer Science, Leuven, Belgium: May 1991, 193-210.[3]Molva R, et al. Authentication of mobile users. IEEE Network, 1994, 11(3): 26-34.[4]Beller M J, Chang L F, Yacobi Y. Privacy and authentication on portable communication system. IEEE J. on SAC, 1993, 11(6): 821-829.[5]Aziz A, Diffie W. Privacy and authentication for wireless local area networks. IEEE Personal Communications, 1994, 1(1): 25-31.[6]Lin H Y, Harn L. Authentication protocols for personal communication systems[J].ACM Computer Communications Review.1995, 25(4):256-261[7]Burrows M, Abadi M, Needham R. A logic of authentication[J].ACM Trans. on Computer Systems.1990, 8(1):18-36[8]Beller M J, Yacobi Y. Fully-fledged two-way public key authentication and key agreement for[9]low-cost terminals. Electron. Lett., 1993, 29(11): 999-1001.[10]Liu J, Wang Y. A user authentication protocol for digital mobile communication network. Proc. PIMRC95, Toronto, Canada: Sept. 1995, 608-612.
计量
- 文章访问数: 1886
- HTML全文浏览量: 85
- PDF下载量: 394
- 被引次数: 0