The research and implementation of 3G terminal authentication service

被引:0
|
作者
Fangzhou Zhang [1 ]
Xiaoyu Sheng [1 ]
机构
[1] Daqing Petr Inst, Sch Comp & Informat Technol, Daqing 163318, Peoples R China
来源
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31 | 2008年
关键词
3G; Security algorithms; Authentication; Security services;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Through analyzing the 3G security services structure, we found that 3GPP did not offer effective authentication services to the terminal client in application domain. On the base of analyzing the Kerberos authentication method and the 3G security mechanism, we first put forward a three-tier security authentication service model for 3G terminal application. The model assembled and encapsulated the 3G security algorithm, and offered a reliable, Proactive and convenient authentication services to the 3G terminal application. This research provided strong support with 3G terminal application.
引用
收藏
页码:38 / 40
页数:3
相关论文
共 47 条
  • [1] Research on Security Authentication Mechanism of Converging WiMAX and 3G Networks
    Wu, Shaobo
    Li, Chengshu
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 525 - 528
  • [2] A Robust Authentication Protocol with Non-Repudiation Service for Integrating WLAN and 3G Network
    Chou-Chen Yang
    Ya-Wen Yang
    Wei-Ting Liu
    Wireless Personal Communications, 2006, 39 : 229 - 251
  • [3] A robust authentication protocol with non-repudiation service for integrating WLAN and 3G network
    Yang, Chou-Chen
    Yang, Ya-Wen
    Liu, Wei-Ting
    WIRELESS PERSONAL COMMUNICATIONS, 2006, 39 (02) : 229 - 251
  • [4] Authentication and billing protocols for the integration of WLAN and 3G networks
    Tseng, YM
    Yang, CC
    Su, JH
    WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 351 - 366
  • [5] An efficient authentication protocol with anonymity for 3G/WLAN interworking
    Chien, Hung-Yu
    Teng, Hung-Yi
    Chen, Yen-Cheng
    JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (01): : 15 - 24
  • [6] An authentication, authorization, and accounting mechanism for 3G/WLAN networks
    Wu, Wei-Chen
    Liaw, Horng-Twu
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 468 - 480
  • [7] Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
    Yuh-Min Tseng
    Chou-Chen Yang
    Jiann-Haur Su
    Wireless Personal Communications, 2004, 29 : 351 - 366
  • [8] A Study on High Security Authentication Mechanism for 3G/WLAN Networks
    Wu, Wei-Chen
    Liaw, Horng-Twu
    UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 247 - 257
  • [9] New authentication mechanism for vertical horizontal Handovers in WLAN and 3G network
    El Idrissi, Younes El Hajjaji
    Zahid, Noureddine
    Jedra, Mohamed
    PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS, 2006, : 26 - +
  • [10] Secure authentication mechanism for RFID tag in WLAN convergence 3G networks
    Guo, Ming-Huang
    Liaw, Horng-Twu
    Chen, Jyun-Fu
    Deng, Der-Jiunn
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 319 - 330