Advanced Search
Volume 21 Issue 4
Jul.  1999
Turn off MathJax
Article Contents
Liu Jianwei, Wang Yumin. AUTHENTICATION PROTOCOL FOR MOBILE USER REGISTRATION IN PERSONAL COMMUNICATION SYSTEMS[J]. Journal of Electronics & Information Technology, 1999, 21(4): 494-499.
Citation: Liu Jianwei, Wang Yumin. AUTHENTICATION PROTOCOL FOR MOBILE USER REGISTRATION IN PERSONAL COMMUNICATION SYSTEMS[J]. Journal of Electronics & Information Technology, 1999, 21(4): 494-499.

AUTHENTICATION PROTOCOL FOR MOBILE USER REGISTRATION IN PERSONAL COMMUNICATION SYSTEMS

  • Received Date: 1996-10-10
  • Rev Recd Date: 1998-11-08
  • Publish Date: 1999-07-19
  • Impersonation and eavesdropping are the crucial threats in wireless communication systems. In personal communication systems (PCS), it is necessary to provide security protection on the voice/data transmitted over wireless links, and perform mutual authentication between mobile user and serving network. Recently, many protocols are proposed for different mobile networks, such as GSM, IS-41, CDPD and wireless LAN. However, these protocols have different weakness when they are applied in PCS environment. Based on the public-key PA model proposed by M.J. Beller, et al.(1993), this paper presents an authentication protocol for mobile user registration. Then the formalized security proof of the protocol using BAN authen- tication logic, and the qualitative analysis about its computing complexity are given. Results show that many new security features are added to the proposed protocols when it is compared with the protocols available.
  • loading
  • Vedder K. Security aspects of mobile communications. Computer Security and Industrial Cryp-[2]tology, Lecture Notes in Computer Science, Leuven, Belgium: May 1991, 193-210.[3]Molva R, et al. Authentication of mobile users. IEEE Network, 1994, 11(3): 26-34.[4]Beller M J, Chang L F, Yacobi Y. Privacy and authentication on portable communication system. IEEE J. on SAC, 1993, 11(6): 821-829.[5]Aziz A, Diffie W. Privacy and authentication for wireless local area networks. IEEE Personal Communications, 1994, 1(1): 25-31.[6]Lin H Y, Harn L. Authentication protocols for personal communication systems[J].ACM Computer Communications Review.1995, 25(4):256-261[7]Burrows M, Abadi M, Needham R. A logic of authentication[J].ACM Trans. on Computer Systems.1990, 8(1):18-36[8]Beller M J, Yacobi Y. Fully-fledged two-way public key authentication and key agreement for[9]low-cost terminals. Electron. Lett., 1993, 29(11): 999-1001.[10]Liu J, Wang Y. A user authentication protocol for digital mobile communication network. Proc. PIMRC95, Toronto, Canada: Sept. 1995, 608-612.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1882) PDF downloads(394) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return