Authentication Protocols for mobile network environment value-added services

被引:40
|
作者
Horn, G [1 ]
Martin, KM
Mitchell, CJ
机构
[1] Siemens AG, Corp Technol, D-81730 Munich, Germany
[2] Katholieke Univ Leuven, COSIC, ESAT, B-3001 Louvain, Belgium
[3] Univ London Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
authentication; cryptography; data security; micropayments; mobile communications; protocols;
D O I
10.1109/25.994813
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The secure provision of mobile computing and telecommunication services is rapidly increasing in importance as both demand and applications for such services continue to grow. This paper is concerned with the design of public key based protocols suitable for application in upcoming third-generation mobile systems such as Universal Mobile Telecommunications Service. Candidate protocols are considered for the authentication of a mobile user to a value-added service provider with initialization of a mechanism enabling payment for the value-added service. A set of goals for such a protocol are identified, as are a number of generic attacks; these goals and attacks are then used to evaluate the suitability of seven candidate third-generation user-to-network authentication protocols. Many of these candidate protocols are shown to have highly undesirable features.
引用
收藏
页码:383 / 392
页数:10
相关论文
共 50 条
  • [21] Implementation and Evaluation of Mobile Ticket Validation Systems for Value-Added Services
    Skarica, Darian
    Belani, Hrvoje
    Illes, Sanja
    2009 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2009, : 260 - 264
  • [22] Value-added services in industrial automation
    Hergenhan, A
    Weiler, C
    Weiss, K
    Rosenstiel, W
    SERVICES AND VISUALIZATION: TOWARDS USER-FRIENDLY DESIGN, 1998, 1385 : 75 - 89
  • [23] The new world of value-added services
    Cohodas, M
    EDN, 2000, : S8 - +
  • [24] Load-balanced agent activation for value-added network services
    Gong, Chao
    Sarac, Kamil
    Daescu, Ovidiu
    Raghavachari, Balaji
    Jothi, Raja
    COMPUTER COMMUNICATIONS, 2006, 29 (11) : 1905 - 1916
  • [25] NETWORK COMPETITION AND VALUE-ADDED SERVICES - WHAT SHOULD FOLLOW ONP
    SANDBACH, J
    TELECOMMUNICATIONS POLICY, 1991, 15 (06) : 479 - 484
  • [26] A 2-dimensional evolution model of value-added mobile Internet services
    Yamakami, T
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 758 - 761
  • [27] Why would telecom customers continue to use mobile value-added services?
    Al-Debei, Mutaz M.
    Dwivedi, Yogesh K.
    Hujran, Omar
    JOURNAL OF INNOVATION & KNOWLEDGE, 2022, 7 (04):
  • [28] The adoption of mobile value-added services Investigating the influence of IS quality and perceived playfulness
    Wang, Kai
    Lin, Chien-Liang
    MANAGING SERVICE QUALITY, 2012, 22 (02): : 184 - 208
  • [29] Factors affecting reuse intention of mobile value-added services: A statistical examination
    Wu, Chuan-Chun
    Wu, Chien-Hsing
    Pu, Ching-Kuo
    JOURNAL OF STATISTICS AND MANAGEMENT SYSTEMS, 2016, 19 (02) : 183 - 217
  • [30] ISPs Find Salvation in Value-Added Services
    Radcliff, D.
    Software Magazine, 17 (02):