Liu Jianwei, Wang Yumin. AUTHENTICATION PROTOCOL FOR MOBILE USER REGISTRATION IN PERSONAL COMMUNICATION SYSTEMS[J]. Journal of Electronics & Information Technology, 1999, 21(4): 494-499.
Citation:
Liu Jianwei, Wang Yumin. AUTHENTICATION PROTOCOL FOR MOBILE USER REGISTRATION IN PERSONAL COMMUNICATION SYSTEMS[J]. Journal of Electronics & Information Technology, 1999, 21(4): 494-499.
Liu Jianwei, Wang Yumin. AUTHENTICATION PROTOCOL FOR MOBILE USER REGISTRATION IN PERSONAL COMMUNICATION SYSTEMS[J]. Journal of Electronics & Information Technology, 1999, 21(4): 494-499.
Citation:
Liu Jianwei, Wang Yumin. AUTHENTICATION PROTOCOL FOR MOBILE USER REGISTRATION IN PERSONAL COMMUNICATION SYSTEMS[J]. Journal of Electronics & Information Technology, 1999, 21(4): 494-499.
Impersonation and eavesdropping are the crucial threats in wireless communication systems. In personal communication systems (PCS), it is necessary to provide security protection on the voice/data transmitted over wireless links, and perform mutual authentication between mobile user and serving network. Recently, many protocols are proposed for different mobile networks, such as GSM, IS-41, CDPD and wireless LAN. However, these protocols have different weakness when they are applied in PCS environment. Based on the public-key PA
model proposed by M.J. Beller, et al.(1993), this paper presents an authentication protocol for
mobile user registration. Then the formalized security proof of the protocol using BAN authen-
tication logic, and the qualitative analysis about its computing complexity are given. Results show that many new security features are added to the proposed protocols when it is compared with the protocols available.
Vedder K. Security aspects of mobile communications. Computer Security and Industrial Cryp-[2]tology, Lecture Notes in Computer Science, Leuven, Belgium: May 1991, 193-210.[3]Molva R, et al. Authentication of mobile users. IEEE Network, 1994, 11(3): 26-34.[4]Beller M J, Chang L F, Yacobi Y. Privacy and authentication on portable communication system. IEEE J. on SAC, 1993, 11(6): 821-829.[5]Aziz A, Diffie W. Privacy and authentication for wireless local area networks. IEEE Personal Communications, 1994, 1(1): 25-31.[6]Lin H Y, Harn L. Authentication protocols for personal communication systems[J].ACM Computer Communications Review.1995, 25(4):256-261[7]Burrows M, Abadi M, Needham R. A logic of authentication[J].ACM Trans. on Computer Systems.1990, 8(1):18-36[8]Beller M J, Yacobi Y. Fully-fledged two-way public key authentication and key agreement for[9]low-cost terminals. Electron. Lett., 1993, 29(11): 999-1001.[10]Liu J, Wang Y. A user authentication protocol for digital mobile communication network. Proc. PIMRC95, Toronto, Canada: Sept. 1995, 608-612.